INFO: task kworker/0:1:11 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:11 tgid:11 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df845d84 r8:00000002 r7:60000113 r6:df845d8c r5:83238000 r4:83238000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83238000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df845e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533c780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83238000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d5ab8c r4:85d5a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d5ab8c r4:830b8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83238000 r8:830b85ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8580 r8:80287e08 r7:df83de60 r6:830b8700 r5:83238000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf845fb0 to 0xdf845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830b5940 INFO: task kworker/0:1:11 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d227d000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/1:1:86 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:86 tgid:86 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c1d84 r8:00000002 r7:60000013 r6:df9c1d8c r5:838bd400 r4:838bd400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838bd400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541aa80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:838bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb52b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544cb8c r4:8544c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544cb8c r4:8329e200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838bd400 r8:8329e22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8329e200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8329e200 r8:80287e08 r7:df879e60 r6:8390c580 r5:838bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c1fb0 to 0xdf9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8329a500 INFO: task kworker/1:1:86 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d2cf2000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/1:2:721 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:721 tgid:721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e012dd84 r8:00000002 r7:60000113 r6:e012dd8c r5:83b00c00 r4:83b00c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b00c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e012de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512c5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b00c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85180b8c r4:85180800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85180b8c r4:83bfd680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b00c00 r8:83bfd6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83bfd680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bfd680 r8:80287e08 r7:df879e60 r6:83acab80 r5:83b00c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe012dfb0 to 0xe012dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83bfe640 INFO: task kworker/1:2:721 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d2cf2000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/0:7:3119 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:8412a400 r4:8412a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8412a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8412a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8472bb8c r4:8472b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8472bb8c r4:84a06880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8412a400 r8:84a068ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06880 r8:80287e08 r7:df995e60 r6:849a1500 r5:8412a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f20c0 INFO: task kworker/0:7:3119 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d2f62000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/0:8:3121 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3121 tgid:3121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:83243c00 r4:83243c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83243c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85086a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83243c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af538c r4:84af5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af538c r4:84a06980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83243c00 r8:84a069ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06980 r8:80287e08 r7:df9e1e60 r6:849a1980 r5:83243c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9edfb0 to 0xdf9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f2280 INFO: task kworker/0:8:3121 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d328b000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/0:9:3122 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f1d84 r8:00000002 r7:60000113 r6:df9f1d8c r5:83242400 r4:83242400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83242400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848489c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83242400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcd1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8501478c r4:85014400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8501478c r4:84a06a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83242400 r8:84a06a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06a00 r8:80287e08 r7:df9ede60 r6:849a1600 r5:83242400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f2280 INFO: task kworker/0:9:3122 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d32f5000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/0:10:3123 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9b9d84 r8:00000002 r7:60000113 r6:df9b9d8c r5:84138000 r4:84138000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84138000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850866c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84138000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe01000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af578c r4:84af5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af578c r4:84a06800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84138000 r8:84a0682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06800 r8:80287e08 r7:df9ede60 r6:84a06b00 r5:84138000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b9fb0 to 0xdf9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f2280 INFO: task kworker/0:10:3123 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d34f7000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/0:11:3126 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9fdd84 r8:00000002 r7:60000113 r6:df9fdd8c r5:8413c800 r4:8413c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8413c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8413c800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0079000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b378c r4:850b3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b378c r4:84a06680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8413c800 r8:84a066ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06680 r8:80287e08 r7:df9b9e60 r6:84a06c00 r5:8413c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f25c0 INFO: task kworker/0:11:3126 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d36fb000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/0:12:3128 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:8413bc00 r4:8413bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8413bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85120f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8413bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0621000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c8b8c r4:850c8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c8b8c r4:84a06a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8413bc00 r8:84a06aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06a80 r8:80287e08 r7:df9fde60 r6:84a06d00 r5:8413bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f2400 INFO: task kworker/0:12:3128 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d3a31000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/0:13:3130 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:8413a400 r4:8413a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8413a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f2780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8413a400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcd7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c8f8c r4:850c8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c8f8c r4:84a06b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8413a400 r8:84a06bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06b80 r8:80287e08 r7:df9e9e60 r6:84a06e00 r5:8413a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f2600 INFO: task kworker/0:13:3130 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d3e31000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3132 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa25d84 r8:00000002 r7:60000013 r6:dfa25d8c r5:841e1800 r4:841e1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85135480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d978c r4:851d9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d978c r4:84a06c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e1800 r8:84a06cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06c80 r8:80287e08 r7:dfa11e60 r6:84a06d80 r5:841e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f2600 INFO: task kworker/0:14:3132 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d5c6b000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3134 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:841e4800 r4:841e4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b40000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0469000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526bb8c r4:8526b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526bb8c r4:84a06e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e4800 r8:84a06eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06e80 r8:80287e08 r7:dfa25e60 r6:84a06f00 r5:841e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f27c0 INFO: task kworker/0:15:3134 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d6536000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:3:3135 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa31d84 r8:00000002 r7:60000013 r6:dfa31d8c r5:841e6000 r4:841e6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848584c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525cb8c r4:8525c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8525cb8c r4:849a1800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e6000 r8:849a182c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849a1800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a1800 r8:80287e08 r7:e012de60 r6:84a06f80 r5:841e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84578a80 INFO: task kworker/1:3:3135 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d6536000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3138 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:841e5400 r4:841e5400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e5400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508c340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851dbf8c r4:851dbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851dbf8c r4:830b8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e5400 r8:830b84ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:80287e08 r7:dfa29e60 r6:830b8400 r5:841e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f2c40 INFO: task kworker/0:16:3138 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d6536000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:4:3140 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:841e3000 r4:841e3000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e3000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84578f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8427d38c r4:8427d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8427d38c r4:849a1a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e3000 r8:849a1aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849a1a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a1a80 r8:80287e08 r7:dfa31e60 r6:84a06300 r5:841e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84578dc0 INFO: task kworker/1:4:3140 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d74a5000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3142 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa49d84 r8:00000002 r7:60000013 r6:dfa49d8c r5:841e0000 r4:841e0000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e0000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85344300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:84a06400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e0000 r8:84a0642c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06400 r8:80287e08 r7:dfa29e60 r6:84a06500 r5:841e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84749040 INFO: task kworker/0:17:3142 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d74a5000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3144 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:841e2400 r4:841e2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847494c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa63000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d178c r4:852d1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d178c r4:8474b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e2400 r8:8474b02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b000 r8:80287e08 r7:dfa49e60 r6:8474b080 r5:841e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847492c0 INFO: task kworker/0:18:3144 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d74a5000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3145 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa6dd84 r8:00000002 r7:60000013 r6:dfa6dd8c r5:841e0c00 r4:841e0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547f680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557238c r4:85572000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557238c r4:8474b100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e0c00 r8:8474b12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b100 r8:80287e08 r7:dfa59e60 r6:8474b180 r5:841e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84749300 INFO: task kworker/0:19:3145 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d7876000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:5:3147 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:841e3c00 r4:841e3c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e3c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514f600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85273b8c r4:85273800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85273b8c r4:849a1b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e3c00 r8:849a1b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849a1b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a1b00 r8:80287e08 r7:dfa3de60 r6:8474b200 r5:841e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84578f80 INFO: task kworker/1:5:3147 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d7876000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3151 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:83b33c00 r4:83b33c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b33c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85504380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b33c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557138c r4:85571000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557138c r4:8474b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b33c00 r8:8474b2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b280 r8:80287e08 r7:dfa6de60 r6:8474b380 r5:83b33c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847496c0 INFO: task kworker/0:20:3151 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d7f65000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3155 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:83b30c00 r4:83b30c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b30c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d3400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b30c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e478c r4:856e4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e478c r4:849a1900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b30c00 r8:849a192c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849a1900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a1900 r8:80287e08 r7:dfa3de60 r6:8474b400 r5:83b30c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84578880 INFO: task kworker/1:6:3155 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d7f65000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3156 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:83b35400 r4:83b35400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b35400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550dec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b35400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8427d78c r4:8427d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8427d78c r4:849a1b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b35400 r8:849a1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849a1b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a1b80 r8:80287e08 r7:dfaa1e60 r6:8474b500 r5:83b35400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84578f00 INFO: task kworker/1:7:3156 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d82cf000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3159 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab5d84 r8:00000002 r7:60000013 r6:dfab5d8c r5:833b9800 r4:833b9800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833b9800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550dac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85387f8c r4:85387c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85387f8c r4:849a1d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833b9800 r8:849a1dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849a1d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a1d80 r8:80287e08 r7:dfaa1e60 r6:8474b300 r5:833b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84578a80 INFO: task kworker/1:8:3159 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d89d4000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3161 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:833bb000 r4:833bb000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833bb000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854aa600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb47b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855bf78c r4:855bf400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855bf78c r4:849a1e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833bb000 r8:849a1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849a1e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a1e80 r8:80287e08 r7:dfaa1e60 r6:8474b480 r5:833bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8474a040 INFO: task kworker/1:9:3161 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d9304000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3162 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfacdd84 r8:00000002 r7:60000013 r6:dfacdd8c r5:833bc800 r4:833bc800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833bc800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855115c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562b38c r4:8562b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562b38c r4:8474b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833bc800 r8:8474b5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b580 r8:80287e08 r7:dfa6de60 r6:8474b600 r5:833bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84749fc0 INFO: task kworker/0:21:3162 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d9304000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3163 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:83b32400 r4:83b32400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b32400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb209000 r4:8474b700 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:849ffe00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3165 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:833b8000 r4:833b8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833b8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855d438c r4:855d4000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3169 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf5d84 r8:00000002 r7:60000013 r6:dfaf5d8c r5:833b0c00 r4:833b0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833b0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d34c0 r7:ddde2d80 r6:83018200 r5:856e4b8c r4:849a1c80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bc040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb97d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8585bf8c r4:8585bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8585bf8c r4:8474b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833b0000 r8:8474b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b6e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb949000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8570078c r4:85700400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570078c r4:840f1680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833b4800 r8:840f16ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:840f1680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840f1680 r8:80287e08 r7:dfaf5e60 r6:8474b880 r5:833b4800 r4:00000001 Exception stack(0xdfb0dfb0 to 0xdfb0dff8) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3175 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:83c96c00 r4:83c96c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83c96c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85507e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8578338c r4:85783000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:833b5400 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:dddced80 r6:83018000 r5:8578378c r4:8474bb00 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:83c91800 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85859f8c r4:85859c00 9fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dad38000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r5:84b72b8c r4:84b72800 Exception stack(0xe04bdfb0 to 0xe04bdff8) r10:8291a684 r9:dfb31d84 r8:00000002 r7:60000113 r6:dfb31d8c r5:83b08000 r5:8570138c r4:85701000 r7:ddde2d80 r6:83018200 r5:8570138c r4:830cc300 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r7:ddde2d80 r6:83018200 r5:8570278c r4:842bde00 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3185 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8584878c r4:85848400 r4:830cc100 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r5:8584d78c r4:8584d400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dc2de000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3190 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:844daf8c r4:844dac00 r10:61c88647 r9:83b34800 r8:83acaa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd20: dc796000 ed45d000 00000001 80239b98 7f55f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:27 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb71d84 r8:00000002 r7:60000013 r6:dfb71d8c r5:83b0bc00 r4:83b0bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b0bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b0400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b0bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4f78c r4:85d4f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d4f78c r4:8474bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b0bc00 r8:8474bfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474bf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474bf80 r8:80287e08 r7:dfaf9e60 r6:8474be80 r5:83b0bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84783100 INFO: task kworker/0:27:3193 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dc796000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 r4:849ffe00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:18:3194 blocked for more than 451 seconds. r5:83b0ec00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c2700 r5:85a28f8c r4:85a28c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84278680 r8:80287e08 r7:dfb59e60 r6:8474bf00 r5:83b0ec00 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3196 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb89d84 r8:00000002 r7:60000113 r6:dfb89d8c r5:84650c00 r4:84650c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84650c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb89e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474ad00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84650c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2938c r4:85a29000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a2938c r4:83aca980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84650c00 r8:83aca9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aca980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdfb89fb0 to 0xdfb89ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3197 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:84651800 r4:84651800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84651800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85341bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84651800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4eb8c r4:85d4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d4eb8c r4:847ffd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84651800 r8:847ffd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ffd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ffd00 r8:80287e08 r7:dfb71e60 r6:847fff80 r5:84651800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84783080 INFO: task kworker/0:28:3197 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: dd20: dd836000 ed45d000 00000001 80239b98 7f55f000 00000001 r4:e04bddc0 r5:00001000 r4:dfdc5000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3199 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:84650000 r4:84650000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84650000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:84650000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 r5:85a29f8c r4:85a29c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849a1380 r8:80287e08 r7:dfb59e60 r6:847c8000 r5:84650000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r5:80050013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r5:00001000 r4:dfdc5000 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84653c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84653c00 r8:849a1fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3203 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb9d84 r8:00000002 r7:60000113 r6:dfbb9d8c r5:84653000 r4:84653000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84653000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5f0c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84653000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2a38c r4:85a2a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a2a38c r4:8432ff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84653000 r8:8432ff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8432ff00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8432ff00 r8:80287e08 r7:dfb59e60 r6:847c8100 r5:84653000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84749940 INFO: task kworker/1:22:3203 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: de099000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e04bddc0 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84652400 r8:8329e32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84654800 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84654800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2bb8c r4:85a2b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a2bb8c r4:8408dc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84654800 r8:8408dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8408dc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8408dc00 r8:80287e08 r7:dfb59e60 r6:847c8200 r5:84654800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84578fc0 INFO: task kworker/1:24:3207 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dee75000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3209 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:84655400 r4:84655400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84655400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r4:00000000 r5:844d978c r4:844d9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: dee75000 ed45d000 00000001 80239b98 7f55f000 00000001 r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3211 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:83b04800 r4:83b04800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b04800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cfe1c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b04800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb883000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d6c38c r4:85d6c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d6c38c r4:849ac000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b04800 r8:849ac02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ac000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ac000 r8:80287e08 r7:dfb59e60 r6:849ac200 r5:83b04800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:8413e000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 r5:85d5b38c r4:85d5b000 r10:61c88647 r9:8413e000 r8:847c832c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: df765000 ed45d000 00000001 80239b98 7f55f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84656c00 r8:847c842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c8400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c8400 r8:80287e08 r7:dfbf5e60 r6:847c8480 r5:84656c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaadfb0 to 0xdfaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84783f40 INFO: task kworker/0:30:3215 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dfdc3000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3218 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc11d84 r8:00000002 r7:60000113 r6:dfc11d8c r5:8389e000 r4:8389e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8389e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e56c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8389e000 r7:00000000 r6:83018200 r5:00001000 r4:7f149000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed855000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844dbb8c r4:844db800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844dbb8c r4:849ac280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8389e000 r8:849ac2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ac280 r10:00000000 r9:849ac280 r8:80287e08 r7:dfb59e60 r6:847c8380 r5:8389e000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3220 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc19d84 r8:00000002 r7:60000013 r6:dfc19d8c r5:8389ec00 r4:8389ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8389ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e568c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8389ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f133000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7fb000 r5:85deff8c r4:85defc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8389ec00 r8:849ac1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r9:83018205 r8:841d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f147000 r5:844db78c r4:844db400 r10:61c88647 r9:841d8000 r8:849ac4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:8389d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8389d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e56f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8389d400 r7:00000000 r6:83018200 r5:00001000 r4:7f145000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed849000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844db38c r4:844db000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844db38c r4:849ac400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8389d400 r8:849ac42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ac400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ac400 r8:80287e08 r7:dfc19e60 r6:847c8600 r5:8389d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc29fb0 to 0xdfc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841a4840 INFO: task kworker/1:30:3223 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e0de8000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3225 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbf1d84 r8:00000002 r7:60000113 r6:dfbf1d8c r5:838bb000 r4:838bb000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838bb000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:85d7ff8c r4:85d7fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849ac580 r8:80287e08 r7:dfc19e60 r6:849ac600 r5:838bb000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:e04bddc0 r5:00001000 r4:dfdc5000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85defb8c r4:85def800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85defb8c r4:849ac380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8412b000 r8:849ac3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ac380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ac380 r8:80287e08 r7:dfc19e60 r6:849ac780 r5:8412b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841a4d40 INFO: task kworker/1:32:3228 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e1c7e000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8412d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85e62f8c r4:85e62c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3232 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3232 tgid:3232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc49d84 r8:00000002 r7:60000113 r6:dfc49d8c r5:84128c00 r4:84128c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84128c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535ba40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84128c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1b3000 r5:85e15b8c r4:85e15800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84128c00 r8:849ac8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3234 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc55d84 r8:00000002 r7:60000113 r6:dfc55d8c r5:83b28c00 r4:83b28c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b28c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r4:00000000 r5:85e0878c r4:85e08400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85e0878c r4:849ac900 r10:00000000 r9:849ac900 r8:80287e08 r7:dfc49e60 r6:849aca80 r5:83b28c00 INFO: task kworker/1:35:3234 is blocked on a mutex likely owned by task kworker/1:221:3732. Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84689800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535bb80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84689800 r7:00000000 r6:83018200 r5:00001000 r4:7f1b7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e1638c r4:85e16000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85e1638c r4:849ac980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84689800 r8:849ac9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ac980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ac980 r8:80287e08 r7:dfc55e60 r6:849aca00 r5:84689800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc69fb0 to 0xdfc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8419c240 INFO: task kworker/1:36:3238 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r5:84b72b8c r4:84b72800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85e1578c r4:849acb00 r10:00000000 r9:849acb00 r8:80287e08 r7:dfc69e60 r6:849acb80 r5:8468a400 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3241 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc75d84 r8:00000002 r7:60000113 r6:dfc75d8c r5:8468bc00 r4:8468bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8468bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc75e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533ccc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8468bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed26f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d5bb8c r4:85d5b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d5bb8c r4:847c8800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8468bc00 r8:847c882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c8800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c8800 r8:80287e08 r7:dfbf5e60 r6:849acc00 r5:8468bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc75fb0 to 0xdfc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f2580 INFO: task kworker/0:31:3241 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e2d59000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:82ac21e4 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r4:849ffe00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:84688000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85d5b78c r4:85d5b400 r7:dddced80 r6:83018000 r5:85d5b78c r4:847c8700 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:33 state:D stack:0 pid:3244 tgid:3244 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b0000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8468b000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d6438c r4:85d64000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d6438c r4:847c8780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8468b000 r8:847c87ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c8780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c8780 r8:80287e08 r7:dfc75e60 r6:849acd00 r5:8468b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc81fb0 to 0xdfc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f2500 INFO: task kworker/0:33:3244 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e3345000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:34:3246 blocked for more than 451 seconds. r5:8468c800 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8468c800 r8:847c89ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85d6478c r4:85d64400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847c8a00 r8:80287e08 r7:dfc81e60 r6:849ace00 r5:8468d400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f2780 INFO: task kworker/0:35:3248 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e3e44000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3249 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc95d84 r8:00000002 r7:60000013 r6:dfc95d8c r5:8468ec00 r4:8468ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8468ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e08 r5:00001000 r4:ed43f000 r5:85d64f8c r4:85d64c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8468ec00 r8:847c8aac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca1fb0 to 0xdfca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f2a00 INFO: task kworker/0:37:3252 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e4911000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3255 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcadd84 r8:00000002 r7:60000013 r6:dfcadd8c r5:84978c00 r4:84978c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84978c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85d6578c r4:85d65400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84978c00 r8:847c8bac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8497a400 r4:8291a680 r4:00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d6538c r4:85d65000 r7:dddced80 r6:83018000 r5:85d6538c r4:847c8900 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84978000 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85d6678c r4:85d66400 r7:dddced80 r6:83018000 r5:85d6678c r4:847c8c80 r10:00000000 r9:847c8c80 r8:80287e08 r7:dfcb5e60 r6:8408d580 r5:84978000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e5434000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3263 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3263 tgid:3263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcbdd84 r8:00000002 r7:60000113 r6:dfcbdd8c r5:8497bc00 r4:8497bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcbde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535b7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f1af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda33000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e1538c r4:85e15000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85e1538c r4:8472c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497bc00 r8:8472c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdfcbdfb0 to 0xdfcbdff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r4:8497d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85e1678c r4:8472c180 r10:61c88647 r9:8497d400 r8:8472c1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472c180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472c180 r8:80287e08 r7:dfc69e60 r6:8472c280 r5:8497d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849e2080 INFO: task kworker/1:39:3267 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e5b03000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535bf80 r5:85e16f8c r4:85e16c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8472c080 Exception stack(0xdfac1fb0 to 0xdfac1ff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3270 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:84808c00 r4:84808c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84808c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535bec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84808c00 r7:00000000 r6:83018200 r5:00001000 r4:7f143000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc4b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e16b8c r4:85e16800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85e16b8c r4:8472c200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84808c00 r8:8472c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472c200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472c200 r8:80287e08 r7:dfac1e60 r6:847c8d80 r5:84808c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:41:3270 is blocked on a mutex likely owned by task kworker/1:221:3732. Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:8480b000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfae5fb0 to 0xdfae5ff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85365540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8480bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f151000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543478c r4:85434400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543478c r4:8472c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8480bc00 r8:8472c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472c480 r8:80287e08 r7:dfae5e60 r6:847c8e00 r5:8480bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849e2780 INFO: task kworker/1:43:3275 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e70fe000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3277 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3277 tgid:3277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:8480c800 r4:8480c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8480c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:8480c800 r7:00000000 r6:83018200 r5:00001000 r4:7f14f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543438c r4:85434000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543438c r4:8472c580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8480c800 r8:8472c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472c580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472c580 r8:80287e08 r7:dfafde60 r6:847c8880 r5:8480c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849e2a00 INFO: task kworker/1:44:3277 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e75b7000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3278 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3278 tgid:3278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb4dd84 r8:00000002 r7:60000013 r6:dfb4dd8c r5:8480d400 r4:8480d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8480d400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d0bc00 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d66f8c r4:85d66c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d66f8c r4:847c8e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8480d400 r8:847c8eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c8e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c8e80 r8:80287e08 r7:dfcc1e60 r6:847c8f00 r5:8480d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847de1c0 INFO: task kworker/0:42:3278 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 task:kworker/1:45 state:D stack:0 pid:3281 tgid:3281 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r9:83018205 r8:8480e000 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 r5:85e17b8c r4:85e17800 r10:61c88647 r9:8480e000 r8:8472c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdfb5dfb0 to 0xdfb5dff8) r4:849e2700 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:00000000 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:3283 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:3283 tgid:3283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:8480ec00 r4:8480ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8480ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85365380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8480ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f14d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e17f8c r4:85e17c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85e17f8c r4:8472c400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8480ec00 r8:8472c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472c400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472c400 r8:80287e08 r7:dfb5de60 r6:8477f000 r5:8480ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849e2640 INFO: task kworker/1:46:3283 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 80050013 ffffffff r4:e04bddc0 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 Not tainted 6.15.0-rc7-syzkaller #0 task:kworker/1:47 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb91d84 r8:00000002 r7:60000013 r6:dfb91d8c r5:8480a400 r4:8480a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8480a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85365780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8480a400 r7:00000000 r6:83018200 r5:00001000 r4:7f155000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85434f8c r4:85434c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85434f8c r4:8472c700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8480a400 r8:8472c72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472c700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472c700 r8:80287e08 r7:dfb5de60 r6:8477f080 r5:8480a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849e2e80 INFO: task kworker/1:47:3284 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e80bc000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe04bdfb0 to 0xe04bdff8) Workqueue: events bpf_prog_free_deferred r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8543578c r4:85435400 r10:61c88647 r9:84809800 r8:8472c7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e2640 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:84b72b8c r4:84b72800 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:3287 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:3287 tgid:3287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbadd84 r8:00000002 r7:60000113 r6:dfbadd8c r5:84808000 r4:84808000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84808000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8543538c r4:85435000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdfbadfb0 to 0xdfbadff8) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84930000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85d6738c r4:85d67000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8477f200 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3291 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3291 tgid:3291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbedd84 r8:00000002 r7:60000113 r6:dfbedd8c r5:84931800 r4:84931800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84931800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85365bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84931800 r7:00000000 r6:83018200 r5:00001000 r4:7f165000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed867000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85435b8c r4:85435800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85435b8c r4:8472c500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84931800 r8:8472c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472c500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472c500 r8:80287e08 r7:dfba1e60 r6:8477f280 r5:84931800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbedfb0 to 0xdfbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:00000000 r9:83018205 r8:84932400 r7:00000000 r6:83018200 r5:00001000 r4:7f169000 r5:8543638c r4:85436000 r10:61c88647 r9:84932400 r8:8472c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472d1c0 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc9e08 r5:85435f8c r4:85435c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:8472d100 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3300 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:3300 tgid:3300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcd5d84 r8:00000002 r7:60000113 r6:dfcd5d8c r5:84936000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8543678c r4:85436400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r9:83018205 r8:84935400 r7:00000000 r6:83018200 r5:00001000 r4:7f16d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85436b8c r4:85436800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85436b8c r4:8472cb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:8472cb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472cb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472cb00 r8:80287e08 r7:dfccde60 r6:8477f680 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcddfb0 to 0xdfcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472d640 INFO: task kworker/1:55:3302 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e9460000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 task:kworker/1:56 state:D stack:0 pid:3305 tgid:3305 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:85436f8c r4:85436c00 r10:61c88647 r9:84934800 r8:8472cbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce9fb0 to 0xdfce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472d800 INFO: task kworker/1:56:3305 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e9f3e000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:8497ec00 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84748140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f171000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543738c r4:85437000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543738c r4:8472ca80 r10:61c88647 r9:8497ec00 r8:8472caac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472d6c0 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r4:00000000 r5:84b72b8c r4:84b72800 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 task:kworker/0:86 state:D stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0029d84 r8:00000002 r7:60000113 r6:e0029d8c r5:8492a400 r4:8492a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0029e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84aebb8c r4:84aeb800 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:849a8580 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: e9f3e000 ed45d000 00000001 80239b98 7f55f000 00000001 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:222:3734 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:222 state:D stack:0 pid:3734 tgid:3734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04c1d84 r8:00000002 r7:60000113 r6:e04c1d8c r5:84ba2400 r4:84ba2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ba2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba2400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b72f8c r4:84b72c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ba2400 r8:84b1cf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80050013 ffffffff r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c9e08 r5:84b7338c r4:84b73000 r10:61c88647 r9:84ba3c00 r8:849ffeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04c9fb0 to 0xe04c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b39400 INFO: task kworker/1:223:3736 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ea9c8000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe04bdfb0 to 0xe04bdff8) Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ba3000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0031000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af478c r4:84af4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af478c r4:849a8780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba3000 r8:849a87ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8780 r8:80287e08 r7:e00d1e60 r6:847d7c80 r5:84ba3000 r4:84859d80 dd20: ea9c8000 ed45d000 00000001 80239b98 7f55f000 00000001 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Not tainted 6.15.0-rc7-syzkaller #0 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d72c0 r5:8472b78c r4:8472b400 r7:dddced80 r6:83018000 r5:8472b78c r4:849a8800 r10:00000000 r9:849a8800 r8:80287e08 r7:e04d1e60 r6:84b3b000 r5:84ba4800 r4:84859d80 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:224:3741 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:224 state:D stack:0 pid:3741 tgid:3741 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84ba6c00 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84b73f8c r4:84b73c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ba6c00 r8:84b3b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b39880 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:e04bddc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:225:3743 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:e04e1d84 r8:00000002 r7:60000013 r6:e04e1d8c r5:84ba5400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39ac0 r5:84b7378c r4:84b73400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84ba6000 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84b73b8c r4:84b73800 r7:ddde2d80 r6:83018200 r5:84b73b8c r4:84b3b180 Exception stack(0xe04d5fb0 to 0xe04d5ff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: eb26c000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:227:3749 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:227 state:D stack:0 pid:3749 tgid:3749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04b9d84 r8:00000002 r7:60000113 r6:e04b9d8c r5:84ba8000 r4:84ba8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ba8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39f00 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b7c38c r4:84b7c000 r10:61c88647 r9:84ba8000 r8:84b3b3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:00000000 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ba8c00 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7cf8c r4:84b7cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7cf8c r4:84b3b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba8c00 r8:84b3b4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b3b480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3b480 r8:80287e08 r7:e04b9e60 r6:84b3b600 r5:84ba8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b24e40 INFO: task kworker/1:228:3750 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: eb5a6000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b7c78c r4:84b7c400 r10:61c88647 r9:84ba9800 r8:84b3b52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 INFO: task kworker/1:230:3754 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:230 state:D stack:0 pid:3754 tgid:3754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04edd84 r8:00000002 r7:60000113 r6:e04edd8c r5:84baa400 r4:84baa400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84baa400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3a000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84baa400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7cb8c r4:84b7c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7cb8c r4:84b3b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84baa400 r8:84b3b5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b3b580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3b580 r8:80287e08 r7:e04e5e60 r6:84b3b680 r5:84baa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04edfb0 to 0xe04edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:00000000 r5:84b72b8c r4:84b72800 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:231:3757 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:231 state:D stack:0 pid:3757 tgid:3757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04f1d84 r8:00000002 r7:60000013 r6:e04f1d8c r5:84bab000 r4:84bab000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bab000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3a380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bab000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b7d38c r4:84b7d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7d38c r4:84b3b780 r4:84b3b780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84babc00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 r5:84b7d78c r4:84b7d400 r4:84b3b900 Exception stack(0xe04f5fb0 to 0xe04f5ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:233:3761 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:233 state:D stack:0 pid:3761 tgid:3761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04f9d84 r8:00000002 r7:60000113 r6:e04f9d8c r5:84bac800 r4:84bac800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bac800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3a840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bac800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0507000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7df8c r4:84b7dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7df8c r4:84b3b980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bac800 r8:84b3b9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b3b980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3b980 r8:80287e08 r7:e04f5e60 r6:84b3ba80 r5:84bac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f9fb0 to 0xe04f9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:234:3762 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:234 state:D stack:0 pid:3762 tgid:3762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04fdd84 r8:00000002 r7:60000113 r6:e04fdd8c r5:84bad400 r4:84bad400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bad400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04fde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3a600 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b7db8c r4:84b7d800 r7:ddde2d80 r6:83018200 r5:84b7db8c r4:84b3bb00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84bae000 r4:8291a680 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0505e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3a980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bae000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e050d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7e38c r4:84b7e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7e38c r4:84b3bb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bae000 r8:84b3bbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b3bb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3bb80 r8:80287e08 r7:e04f9e60 r6:84b3bc00 r5:84bae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0505fb0 to 0xe0505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3a800 INFO: task kworker/1:235:3765 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: eca28000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84baec00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e051b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7e78c r4:84b7e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7e78c r4:84b3bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84baec00 r8:84b3bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b3bc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3bc80 r8:80287e08 r7:e0505e60 r6:84b3bd00 r5:84baec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0519fb0 to 0xe0519ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84b3a8c0 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:00000000 r5:84b72b8c r4:84b72800 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84bb0000 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b7eb8c r4:84b7e800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84b3aa00 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:238:3769 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:238 state:D stack:0 pid:3769 tgid:3769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e052dd84 r8:00000002 r7:60000113 r6:e052dd8c r5:84bb1800 r4:84bb1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bb1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e052de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bb1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0535000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7ef8c r4:84b7ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7ef8c r4:84b3be00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb1800 r8:84b3be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b3be00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3be00 r8:80287e08 r7:e0525e60 r6:84b3be80 r5:84bb1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe052dfb0 to 0xe052dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3ad00 INFO: task kworker/1:238:3769 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ecf3d000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 INFO: task kworker/0:91:3772 blocked for more than 452 seconds. Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e053dd84 r8:00000002 r7:60000113 r6:e053dd8c r5:84bb3000 r4:84bb3000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bb3000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e053de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7b40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bb3000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e000f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af438c r4:84af4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af438c r4:849a8880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb3000 r8:849a88ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8880 r8:80287e08 r7:e04d1e60 r6:84b3bf80 r5:84bb3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe053dfb0 to 0xe053dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d7280 INFO: task kworker/0:91:3772 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ecf3d000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84bb3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 r5:84b7fb8c r4:84b7f800 r10:61c88647 r9:84bb3c00 r8:849c102c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: 7f600000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 task:kworker/1:240 state:D stack:0 pid:3775 tgid:3775 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84bb4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0549e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c2100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bb4800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df973000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7f38c r4:84b7f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7f38c r4:849c1080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb4800 r8:849c10ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849c1080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1080 r8:80287e08 r7:e0545e60 r6:849c1280 r5:84bb4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0549fb0 to 0xe0549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c20c0 INFO: task kworker/1:240:3775 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 7f600000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 90050013 ffffffff r5:90050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:241:3777 blocked for more than 452 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84bb0c00 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84b7f78c r4:84b7f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84bb0c00 r8:849c112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd60: 80230ad0 80239bb0 90050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84bb5400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd2b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7ff8c r4:84b7fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7ff8c r4:849c1200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb5400 r8:849c122c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849c1200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1200 r8:80287e08 r7:e0545e60 r6:849c1400 r5:84bb5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0539fb0 to 0xe0539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c2480 INFO: task kworker/1:242:3781 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 7fbd8000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 90050013 ffffffff r5:90050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8500078c r4:85000400 r7:ddde2d80 r6:83018200 r5:8500078c r4:849c1480 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8500038c r4:849c1500 r10:00000000 r9:849c1500 r8:80287e08 r7:e0551e60 r6:849c1680 r5:84bb6c00 r4:849c2940 INFO: task kworker/1:244:3783 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 7fed4000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 90050013 ffffffff r5:90050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:245:3786 blocked for more than 452 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85000b8c r4:85000800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84bb2400 r8:849c15ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd60: 80230ad0 80239bb0 90050013 ffffffff r4:e04bddc0 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84bb8c00 r8:849c162c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:84bb9800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bb9800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0561e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c2ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bb9800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500138c r4:85001000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500138c r4:849c1880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb9800 r8:849c18ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849c1880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1880 r8:80287e08 r7:e0511e60 r6:849c1700 r5:84bb9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0561fb0 to 0xe0561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c2c40 INFO: task kworker/1:247:3790 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 80b22000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:248:3793 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:248 state:D stack:0 pid:3793 tgid:3793 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r5:84bba400 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84bba400 r8:849c192c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849c1900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1900 r8:80287e08 r7:e0561e60 r6:849c1a00 r5:84bba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c2f80 INFO: task kworker/1:248:3793 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 80fb6000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8462a7c0 r5:8500238c r4:85002000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849c1a80 r8:80287e08 r7:e055de60 r6:849c1980 r5:84bbb000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84bbc800 r8:849c1b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:251:3797 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:251 state:D stack:0 pid:3797 tgid:3797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e058dd84 r8:00000002 r7:60000113 r6:e058dd8c r5:84bbd400 r4:84bbd400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bbd400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e058de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8462a480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bbd400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85001f8c r4:85001c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85001f8c r4:849c1b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bbd400 r8:849c1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849c1b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1b80 r8:80287e08 r7:e0565e60 r6:849c1c00 r5:84bbd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84bbbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 r5:85002f8c r4:85002c00 r10:61c88647 r9:84bbbc00 r8:849c1d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd20: 81a1f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:92:3802 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:92 state:D stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0581d84 r8:00000002 r7:60000013 r6:e0581d8c r5:84acb000 r4:84acb000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84acb000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0581e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84af5f8c r4:84af5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:849a8a80 Exception stack(0xe0581fb0 to 0xe0581ff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80050013 r4:80239bb0 r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0595e08 r5:00001000 r4:e0471000 r5:8500338c r4:85003000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 81a1f000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:253:3806 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:253 state:D stack:0 pid:3806 tgid:3806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05add84 r8:00000002 r7:60000113 r6:e05add8c r5:84acd400 r4:84acd400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84acd400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05ade08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8462a900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84acd400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0129000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500278c r4:85002400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500278c r4:849c1e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84acd400 r8:849c1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849c1e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1e80 r8:80287e08 r7:e0591e60 r6:849a8b80 r5:84acd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462a880 INFO: task kworker/1:253:3806 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 820ca000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:254:3809 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:254 state:D stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05c9d84 r8:00000002 r7:60000113 r6:e05c9d8c r5:84aca400 r4:84aca400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aca400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8462a9c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84aca400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0453000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85002b8c r4:85002800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85002b8c r4:849c1f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aca400 r8:849c1f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849c1f00 r10:00000000 r9:849c1f00 r8:80287e08 r7:e0591e60 r6:849a8c00 r5:84aca400 INFO: task kworker/1:254:3809 is blocked on a mutex likely owned by task kworker/1:221:3732. dd20: 827c5000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:255:3810 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:255 state:D stack:0 pid:3810 tgid:3810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05d5d84 r8:00000002 r7:60000113 r6:e05d5d8c r5:84acc800 r4:84acc800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84acc800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:e048f000 r5:85003b8c r4:85003800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84bbec00 r4:8291a680 r4:00000000 r4:00000000 r5:8500378c r4:85003400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849f3000 r8:80287e08 r7:e05d5e60 r6:849f3100 r5:84bbec00 INFO: task kworker/1:256:3812 is blocked on a mutex likely owned by task kworker/1:221:3732. dd20: 82df5000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:e04bddc0 r5:00001000 r4:ed727000 r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:84af4b8c r4:84af4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84bbe000 r8:849a8e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8e00 r8:80287e08 r7:e0581e60 r6:849f3180 r5:84bbe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05a1fb0 to 0xe05a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d7200 INFO: task kworker/0:94:3814 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 82fab000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:257:3816 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:257 state:D stack:0 pid:3816 tgid:3816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05e1d84 r8:00000002 r7:60000113 r6:e05e1d8c r5:85048c00 r4:85048c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85048c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 r5:85003f8c r4:85003c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:849f3300 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:00000000 r5:85ef678c r4:85ef6400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8500c38c r4:8500c000 r10:61c88647 r9:85048000 r8:849f32ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849f3280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f3280 r8:80287e08 r7:e05e1e60 r6:849f3380 r5:85048000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83ac7240 INFO: task kworker/1:258:3820 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 835f9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:259:3821 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8500cb8c r4:8500c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe059dfb0 to 0xe059dff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r5:85ef678c r4:85ef6400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8500c78c r4:8500c400 r4:849f3500 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83ac7440 INFO: task kworker/1:260:3822 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 839f1000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:261:3825 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:261 state:D stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05f1d84 r8:00000002 r7:60000013 r6:e05f1d8c r5:8504bc00 r4:8504bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8500cf8c r4:8500cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: 83f69000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 Workqueue: events bpf_prog_free_deferred r5:8504c800 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8449c000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:263:3830 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:263 state:D stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e061dd84 r8:00000002 r7:60000113 r6:e061dd8c r5:8504d400 r4:8504d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e061de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8500d78c r4:8500d400 r7:ddde2d80 r6:83018200 r5:8500d78c r4:849f3600 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 84952000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:8504e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e062de08 r9:83018205 r8:8504e000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0641e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8462a100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8504ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500e38c r4:8500e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500e38c r4:849f3a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504ec00 r8:849f3a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849f3a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f3a00 r8:80287e08 r7:e062de60 r6:849f3b80 r5:8504ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0641fb0 to 0xe0641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83ac7980 INFO: task kworker/1:265:3833 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 84be9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:266:3835 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:266 state:D stack:0 pid:3835 tgid:3835 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85050000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85050000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 r5:8500df8c r4:8500dc00 r10:61c88647 r9:85050000 r8:849f3aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:85050c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85050c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0661e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85050c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0665000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500e78c r4:8500e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500e78c r4:849f3c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85050c00 r8:849f3c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849f3c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f3c00 r8:80287e08 r7:e0641e60 r6:849f3c80 r5:85050c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0661fb0 to 0xe0661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83ac7bc0 INFO: task kworker/1:267:3837 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 850cb000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Exception stack(0xe04bdfb0 to 0xe04bdff8) INFO: task kworker/1:268:3841 blocked for more than 453 seconds. r4:85052400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0659e08 r5:00001000 r4:e0671000 r5:8500ef8c r4:8500ec00 r10:61c88647 r9:85052400 r8:849f3d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 855b8000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:e04bddc0 r5:00001000 r4:ed727000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85053000 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85053000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500eb8c r4:8500e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500eb8c r4:849f3e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85053000 r8:849f3e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849f3e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f3e00 r8:80287e08 r7:e0659e60 r6:849f3e80 r5:85053000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05fdfb0 to 0xe05fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2f240 INFO: task kworker/1:269:3842 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 85ac1000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:270:3844 blocked for more than 453 seconds. r4:85053c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0675e08 r9:83018205 r8:85053c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 r5:8500f38c r4:8500f000 r4:849f3f80 Exception stack(0xe0675fb0 to 0xe0675ff8) INFO: task kworker/1:270:3844 is blocked on a mutex likely owned by task kworker/1:221:3732. dd20: 85ac1000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r5:85ef678c r4:85ef6400 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85054800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e067de08 r9:83018205 r8:85054800 r7:00000000 r6:83018200 r5:00001000 r4:7f011000 r5:8500f78c r4:8500f400 r10:61c88647 r9:85054800 r8:849f30ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 85f36000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:272:3849 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:272 state:D stack:0 pid:3849 tgid:3849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0681d84 r8:00000002 r7:60000113 r6:e0681d8c r5:85055400 r4:85055400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85055400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0681e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85055400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500fb8c r4:8500f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500fb8c r4:8484a100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85055400 r8:8484a12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8484a100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8484a100 r8:80287e08 r7:e067de60 r6:8484a180 r5:85055400 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85056000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:8501438c r4:85014000 r4:8484a000 Exception stack(0xe0685fb0 to 0xe0685ff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: 86049000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:274:3851 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:274 state:D stack:0 pid:3851 tgid:3851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e068dd84 r8:00000002 r7:60000113 r6:e068dd8c r5:85056c00 r4:85056c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85056c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e068de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2fa40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85056c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500ff8c r4:8500fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500ff8c r4:8484a200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85056c00 r8:8484a22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8484a200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8484a200 r8:80287e08 r7:e0685e60 r6:8484a280 r5:85056c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe068dfb0 to 0xe068dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:274:3851 is blocked on a mutex likely owned by task kworker/1:221:3732. dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:849ffe00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:275:3854 blocked for more than 453 seconds. r4:85051800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0689e08 r5:00001000 r4:dfdc3000 r5:85014b8c r4:85014800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8484a300 r8:80287e08 r7:e0685e60 r6:8484a400 r5:85051800 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) INFO: task kworker/0:95:3857 blocked for more than 453 seconds. r4:84bb8000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0691e08 r9:83018005 r8:84bb8000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 r5:84af4f8c r4:84af4c00 r10:61c88647 r9:84bb8000 r8:849a8d2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 869c6000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:276:3858 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:276 state:D stack:0 pid:3858 tgid:3858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0699d84 r8:00000002 r7:60000113 r6:e0699d8c r5:85049800 r4:85049800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85049800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0699e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84800540 r5:85014f8c r4:85014c00 r7:ddde2d80 r6:83018200 r5:85014f8c r4:8484a580 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:e04bddc0 r5:00001000 r4:ed727000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85060c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r5:8501578c r4:85015400 r10:61c88647 r9:85060c00 r8:8484a52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe069dfb0 to 0xe069dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2fd40 INFO: task kworker/1:277:3859 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 87050000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84b392c0 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8501538c r4:85015000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85061800 r8:8484a62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r5:80050013 r4:80239bb0 r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:8501678c r4:85016400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8484a780 r8:80287e08 r7:e069de60 r6:8484a880 r5:85063000 INFO: task kworker/1:279:3865 is blocked on a mutex likely owned by task kworker/1:221:3732. Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:280:3867 blocked for more than 453 seconds. r4:85063c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ae400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85063c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0085000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85015b8c r4:85015800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85015b8c r4:8484a900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85063c00 r8:8484a92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8484a900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8484a900 r8:80287e08 r7:e0695e60 r6:8484aa00 r5:85063c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a5fb0 to 0xe06a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849ae500 INFO: task kworker/1:280:3867 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8760c000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:281:3868 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:281 state:D stack:0 pid:3868 tgid:3868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06add84 r8:00000002 r7:60000013 r6:e06add8c r5:85064800 r4:85064800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85064800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ade08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ae680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85064800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0095000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85015f8c r4:85015c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85015f8c r4:8484a800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85064800 r8:8484a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8484a800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8484a800 r8:80287e08 r7:e0695e60 r6:8484a980 r5:85064800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 87ace000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:282:3870 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85065400 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8501638c r4:85016000 r10:61c88647 r9:85065400 r8:8484aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84ac9800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r5:84af5b8c r4:84af5800 r10:61c88647 r9:84ac9800 r8:849a8eac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:283:3874 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:283 state:D stack:0 pid:3874 tgid:3874 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06c1d84 r8:00000002 r7:60000113 r6:e06c1d8c r5:84acbc00 r4:84acbc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84acbc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849aea40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84acbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 r5:00001000 r4:e04a9000 r5:85016b8c r4:85016800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:00000000 r5:85ef678c r4:85ef6400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84ac8000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 r5:85020b8c r4:85020800 r10:61c88647 r9:84ac8000 r8:8484acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 8865e000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:e04bddc0 r5:00001000 r4:ed727000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849aec00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84acec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85016f8c r4:85016c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85016f8c r4:8484ad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84acec00 r8:8484adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8484ad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8484ad80 r8:80287e08 r7:e06c9e60 r6:8485bd80 r5:84acec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d1fb0 to 0xe06d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849ae980 INFO: task kworker/1:285:3877 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8865e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:286:3879 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:286 state:D stack:0 pid:3879 tgid:3879 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84640000 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8501738c r4:85017000 r7:ddde2d80 r6:83018200 r5:8501738c r4:8484ad00 r10:00000000 r9:8484ad00 r8:80287e08 r7:e06c9e60 r6:84846f00 r5:84640000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849aee40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84642400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0515000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8501778c r4:85017400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501778c r4:8484ae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84642400 r8:8484aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8484ae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8484ae80 r8:80287e08 r7:e06c9e60 r6:84846f80 r5:84642400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e5fb0 to 0xe06e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849aecc0 INFO: task kworker/1:287:3882 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 89261000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84640c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 r5:85017b8c r4:85017800 r10:61c88647 r9:84640c00 r8:8484ae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:80050013 r4:80239bb0 r4:e04bddc0 r5:00001000 r4:ed727000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0533000 r5:85017f8c r4:85017c00 r10:61c88647 r9:84641800 r8:849c1dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:290:3887 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:290 state:D stack:0 pid:3887 tgid:3887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06f9d84 r8:00000002 r7:60000113 r6:e06f9d8c r5:84644800 r4:84644800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84644800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b22040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84644800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8502038c r4:85020000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502038c r4:8484af80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84644800 r8:8484afac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8484af80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8484af80 r8:80287e08 r7:e06c9e60 r6:84b4c100 r5:84644800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f9fb0 to 0xe06f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849ae240 INFO: task kworker/1:290:3887 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 89261000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8502078c r4:85020400 r7:ddde2d80 r6:83018200 r5:8502078c r4:8478b080 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:292:3891 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:292 state:D stack:0 pid:3891 tgid:3891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0715d84 r8:00000002 r7:60000113 r6:e0715d8c r5:84646000 r4:84646000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84646000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0715e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b22540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84646000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8502138c r4:85021000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8478b000 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04bdd28 to 0xe04bdd70) r5:80050013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r5:85ef678c r4:85ef6400 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0729e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b22400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84643c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e071f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85020f8c r4:85020c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85020f8c r4:8478b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84643c00 r8:8478b22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8478b200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b200 r8:80287e08 r7:e0715e60 r6:84b4c280 r5:84643c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0729fb0 to 0xe0729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b22280 INFO: task kworker/1:293:3893 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84a26c00 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e073b000 r5:8502178c r4:85021400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe04bdd28 to 0xe04bdd70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:ed727000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b22a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84646c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e075d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8502238c r4:85022000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502238c r4:8478b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84646c00 r8:8478b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8478b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b280 r8:80287e08 r7:e0731e60 r6:84b4c380 r5:84646c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0745fb0 to 0xe0745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b22480 INFO: task kworker/1:295:3897 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8a1d2000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000001 r4:84b392c0 r10:8291a684 r9:e074dd84 r8:00000002 r7:60000013 r6:e074dd8c r5:84a30000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85021b8c r4:8478b380 r4:8478b380 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b22480 INFO: task kworker/1:296:3899 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8a725000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Not tainted 6.15.0-rc7-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0761e08 r5:85021f8c r4:85021c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8478b400 r8:80287e08 r7:e0745e60 r6:84b4c480 r5:84a31800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b229c0 INFO: task kworker/1:297:3901 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8a871000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0769e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b22e00 r5:85022f8c r4:85022c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b22b80 r5:8502278c r4:85022400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a32400 r8:8478b4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0781fb0 to 0xe0781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b22a00 INFO: task kworker/1:299:3905 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8ad65000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:84a30c00 r4:8291a680 r4:00000000 r9:83018205 r8:84a30c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 r5:85022b8c r4:85022800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8478b500 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80050013 ffffffff r4:e04bddc0 r5:00001000 r4:ed727000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:301:3910 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:301 state:D stack:0 pid:3910 tgid:3910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07a5d84 r8:00000002 r7:60000113 r6:e07a5d8c r5:84a33c00 r4:84a33c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a33c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84848880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a33c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8502338c r4:85023000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502338c r4:8478b580 r4:8478b580 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:302:3911 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:302 state:D stack:0 pid:3911 tgid:3911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07a9d84 r8:00000002 r7:60000013 r6:e07a9d8c r5:84a34800 r4:84a34800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a34800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f2180 r5:8502378c r4:85023400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502378c r4:8478b600 r10:00000000 r9:8478b600 r8:80287e08 r7:e07a5e60 r6:84b4c700 r5:84a34800 INFO: task kworker/1:302:3911 is blocked on a mutex likely owned by task kworker/1:221:3732. Exception stack(0xe04bdd28 to 0xe04bdd70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 Workqueue: events bpf_prog_free_deferred r5:84a36000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07ade08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85025b8c r4:85025800 r7:ddde2d80 r6:83018200 r5:85025b8c r4:8478b700 r10:00000000 r9:8478b700 r8:80287e08 r7:e07a9e60 r6:84b4c780 r5:84a36000 r4:84b22ec0 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 task:kworker/1:304 state:D stack:0 pid:3916 tgid:3916 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b9e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85023b8c r4:8478b680 r10:00000000 r9:8478b680 r8:80287e08 r7:e07ade60 r6:84b4c800 r5:84ac8c00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b9fb0 to 0xe07b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841a10c0 INFO: task kworker/1:304:3916 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8b85d000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:305:3917 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:305 state:D stack:0 pid:3917 tgid:3917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07bdd84 r8:00000002 r7:60000113 r6:e07bdd8c r5:84643000 r4:84643000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84643000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07bde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841a11c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84643000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd7f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85023f8c r4:85023c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85023f8c r4:8478b780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84643000 r8:8478b7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8478b780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478b780 r8:80287e08 r7:e07ade60 r6:84b4c880 r5:84643000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841a10c0 INFO: task kworker/1:305:3917 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8b85d000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8502438c r4:85024000 r10:00000000 r9:8478b800 r8:80287e08 r7:e07ade60 r6:84b4c900 r5:84a35400 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07c5fb0 to 0xe07c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841a1180 INFO: task kworker/1:306:3919 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) r4:e04bddc0 r5:85ef678c r4:85ef6400 Exception stack(0xe04bdfb0 to 0xe04bdff8) Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07cde08 r9:83018205 r8:848d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 r5:8502478c r4:85024400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8478b900 r8:80287e08 r7:e07ade60 r6:84b4c980 r5:848d0c00 r4:841a1300 Call trace: dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r4:e04bddc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85024b8c r4:85024800 r10:00000000 r9:8478b980 r8:80287e08 r7:e07ade60 r6:84b4ca00 r5:848d2400 Exception stack(0xe04bdd28 to 0xe04bdd70) r4:00000000 r4:849ffe00 dfa0: 00000000 00000000 00000000 00000000 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:309:3925 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:309 state:D stack:0 pid:3925 tgid:3925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07edd84 r8:00000002 r7:60000113 r6:e07edd8c r5:848d1800 r4:848d1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07ede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841a1640 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85024f8c r4:8478ba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d1800 r8:8478ba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8478ba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ba00 r8:80287e08 r7:e07ade60 r6:84b4ca80 r5:848d1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07edfb0 to 0xe07edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:841a1580 Exception stack(0xe04bdd28 to 0xe04bdd70) r4:e04bddc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f5e08 r5:8502538c r4:85025000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:841a18c0 INFO: task kworker/1:310:3927 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8cd2d000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:849ffe00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:848d3000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8502578c r4:85025400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e04bddc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:312:3931 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:312 state:D stack:0 pid:3931 tgid:3931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:848d3c00 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:848d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 r5:8502678c r4:85026400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8478bb00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:313:3933 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:313 state:D stack:0 pid:3933 tgid:3933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0839d84 r8:00000002 r7:60000113 r6:e0839d8c r5:848d4800 r4:848d4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0839e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841a1c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0149000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85025f8c r4:85025c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85025f8c r4:8478bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d4800 r8:8478bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8478bc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478bc00 r8:80287e08 r7:e0819e60 r6:84b4cc80 r5:848d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:313:3933 is blocked on a mutex likely owned by task kworker/1:221:3732. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:848d5400 r4:00000000 r9:83018205 r8:848d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:841a1bc0 Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8d23d000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:848d6000 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85026b8c r4:85026800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8478bb80 r8:80287e08 r7:e0819e60 r6:84b4cd80 r5:848d6000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:316:3939 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:316 state:D stack:0 pid:3939 tgid:3939 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84bc8000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0587000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85026f8c r4:85026c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85026f8c r4:8478bd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:8478bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8478bd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478bd00 r8:80287e08 r7:e084de60 r6:84b4ce00 r5:84bc8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0855fb0 to 0xe0855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd60: 80230ad0 80239bb0 80050013 ffffffff r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r4:00000001 r4:84b392c0 r10:8291a684 r9:e085dd84 r8:00000002 r7:60000013 r6:e085dd8c r5:84bc9800 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8502738c r4:85027000 r10:61c88647 r9:84bc9800 r8:8478be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:318:3943 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:318 state:D stack:0 pid:3943 tgid:3943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:84bca400 r4:8291a680 r4:00000000 r5:8502778c r4:85027400 r7:ddde2d80 r6:83018200 r5:8502778c r4:8478bd80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 Exception stack(0xe04bdfb0 to 0xe04bdff8) task:kworker/1:319 state:D stack:0 pid:3946 tgid:3946 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc2540 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502838c r4:8478be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bcc800 r8:8478beac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8478be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478be80 r8:80287e08 r7:e0861e60 r6:84b4cf80 r5:84bcc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe086dfb0 to 0xe086dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc2100 INFO: task kworker/1:319:3946 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8de76000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Not tainted 6.15.0-rc7-syzkaller #0 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85027b8c r4:85027800 r4:8478bf00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:849ffe00 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:321:3949 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:321 state:D stack:0 pid:3949 tgid:3949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0879d84 r8:00000002 r7:60000113 r6:e0879d8c r5:84bcbc00 r4:84bcbc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bcbc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0879e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc2340 r5:85027f8c r4:85027c00 r10:61c88647 r9:84bcbc00 r8:8478b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8478b100 r8:80287e08 r7:e086de60 r6:85079080 r5:84bcbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0879fb0 to 0xe0879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc2480 INFO: task kworker/1:321:3949 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8e4b9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe04bdfb0 to 0xe04bdff8) task:kworker/1:322 state:D stack:0 pid:3952 tgid:3952 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc2680 r5:8502878c r4:85028400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) INFO: task kworker/1:322:3952 is blocked on a mutex likely owned by task kworker/1:221:3732. [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-rc7-syzkaller #0 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8507a080 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc2500 INFO: task kworker/1:323:3953 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8e4b9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85028b8c r4:85028800 r4:8507a100 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:325:3958 blocked for more than 454 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48c9e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85028f8c r4:85028c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85028f8c r4:8507a280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8c00 r8:8507a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507a280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507a280 r8:80287e08 r7:e48b5e60 r6:85079280 r5:84bc8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48c9fb0 to 0xe48c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc27c0 INFO: task kworker/1:325:3958 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8ecce000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84a36c00 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8502978c r4:85029400 r10:61c88647 r9:84a36c00 r8:8507a22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc2b00 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:849ffe00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48d5e08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bd0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e082f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8502a38c r4:8502a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502a38c r4:8507a380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd0c00 r8:8507a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507a380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507a380 r8:80287e08 r7:e48cde60 r6:85079380 r5:84bd0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48d5fb0 to 0xe48d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc2a80 INFO: task kworker/1:327:3961 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8ef56000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48dde08 r5:85029b8c r4:85029800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:84bd1800 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85029f8c r4:85029c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85029f8c r4:8507a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd1800 r8:8507a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507a480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507a480 r8:80287e08 r7:e48d5e60 r6:85079480 r5:84bd1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48e5fb0 to 0xe48e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc2e00 INFO: task kworker/1:329:3965 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8f3fe000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:330:3967 blocked for more than 454 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48ede08 r5:8502b38c r4:8502b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8507a180 r8:80287e08 r7:e48d5e60 r6:85079500 r5:84bd0000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80050013 ffffffff r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:331:3969 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:331 state:D stack:0 pid:3969 tgid:3969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e48f5d84 r8:00000002 r7:60000113 r6:e48f5d8c r5:84bd3000 r4:84bd3000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bd3000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48f5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508b040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48fde08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502ab8c r4:8507a600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd4800 r8:8507a62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507a600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507a600 r8:80287e08 r7:e48ede60 r6:85079600 r5:84bd4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48fdfb0 to 0xe48fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508b100 INFO: task kworker/1:332:3971 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8ff45000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) INFO: task kworker/1:333:3975 blocked for more than 454 seconds. [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8502c78c r4:8502c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:00000000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:334:3981 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84bd6c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0735e08 r5:8502b78c r4:8502b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: dd60: 80230ad0 80239bb0 80050013 ffffffff r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 Exception stack(0xe04bdfb0 to 0xe04bdff8) task:kworker/1:335 state:D stack:0 pid:3982 tgid:3982 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:8502bb8c r4:8502b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502bb8c r4:8507a580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd3c00 r8:8507a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507a580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507a580 r8:80287e08 r7:e0735e60 r6:85079700 r5:84bd3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0751fb0 to 0xe0751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508b800 INFO: task kworker/1:335:3982 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:336:3983 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:336 state:D stack:0 pid:3983 tgid:3983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8502bf8c r4:8502bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8507a780 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:849ffe00 dfa0: 00000000 00000000 00000000 00000000 r4:84bd8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bd8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e076de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508b7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bd8000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8502c38c r4:8502c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502c38c r4:8507a700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd8000 r8:8507a72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507a700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507a700 r8:80287e08 r7:e0755e60 r6:85079880 r5:84bd8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe076dfb0 to 0xe076dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508b800 INFO: task kworker/1:337:3984 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 dfa0: 00000000 00000000 00000000 00000000 r10:8291a684 r9:e0771d84 r8:00000002 r7:60000013 r6:e0771d8c r5:84bd8c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc7b00 r5:8502cf8c r4:8502cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:339:3987 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:339 state:D stack:0 pid:3987 tgid:3987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e071dd84 r8:00000002 r7:60000013 r6:e071dd8c r5:84bd9800 r4:84bd9800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bd9800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e071de08 r4:00000000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8502cb8c r4:8502c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8507a880 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:97:3990 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:97 state:D stack:0 pid:3990 tgid:3990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e48f1d84 r8:00000002 r7:60000113 r6:e48f1d8c r5:84bda400 r4:84bda400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bda400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48f1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ccf00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bda400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0093000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af638c r4:84af6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af638c r4:85079980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bda400 r8:850799ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85079980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85079980 r8:80287e08 r7:e0581e60 r6:85079b00 r5:84bda400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48f1fb0 to 0xe48f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85086dc0 INFO: task kworker/0:97:3990 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9157e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b5e08 r5:00001000 r4:e04ff000 r5:84af6f8c r4:84af6c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: 9157e000 dfdc7000 00000001 80239b98 7f561000 00000001 r5:00001000 r4:ed727000 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 task:kworker/0:99 state:D stack:0 pid:3994 tgid:3994 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:84bdbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af678c r4:84af6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af678c r4:85079d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bdbc00 r8:85079d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85079d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85079d00 r8:80287e08 r7:e06b5e60 r6:85079b80 r5:84bdbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe078dfb0 to 0xe078dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85091040 INFO: task kworker/0:99:3994 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 91a42000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 dfa0: 00000000 00000000 00000000 00000000 r10:8291a684 r9:e8919d84 r8:00000002 r7:60000013 r6:e8919d8c r5:84bdc800 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84af6b8c r4:84af6800 r10:61c88647 r9:84bdc800 r8:85079dac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: 91d95000 dfdc7000 00000001 80239b98 7f561000 00000001 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84bdd400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e891de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85091240 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bdd400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0513000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af738c r4:84af7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af738c r4:85079e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bdd400 r8:85079e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85079e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85079e00 r8:80287e08 r7:e06b5e60 r6:85079f00 r5:84bdd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe891dfb0 to 0xe891dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85091180 INFO: task kworker/0:101:3998 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 91ffc000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85ef678c r4:85ef6400 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 INFO: task kworker/0:102:4000 blocked for more than 454 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8921e08 r5:84af778c r4:84af7400 r10:61c88647 r9:84bde000 r8:8508e02c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:102:4000 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 91ffc000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Exception stack(0xe04bdfb0 to 0xe04bdff8) Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8925e08 r5:8309ef8c r4:8309ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 INFO: task kworker/0:103:4002 is blocked on a mutex likely owned by task kworker/1:221:3732. r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:104:4004 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:104 state:D stack:0 pid:4004 tgid:4004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8929d84 r8:00000002 r7:60000113 r6:e8929d8c r5:84a48000 r4:84a48000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a48000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8929e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85091680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a48000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0541000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af7b8c r4:84af7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a48000 r8:850870ac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:104:4004 is blocked on a mutex likely owned by task kworker/1:221:3732. dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:849ffe00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84af7f8c r4:84af7c00 r4:85087000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9263d000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e892de08 r5:83cc638c r4:83cc6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/0:107:4010 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:107 state:D stack:0 pid:4010 tgid:4010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8935d84 r8:00000002 r7:60000013 r6:e8935d8c r5:84a4a400 r4:84a4a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a4a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8935e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85091c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4a400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0701000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8472bf8c r4:8472bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8472bf8c r4:85087300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4a400 r8:8508732c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85087300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85087300 r8:80287e08 r7:e892de60 r6:85087500 r5:84a4a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8935fb0 to 0xe8935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: 93303000 dfdc7000 00000001 80239b98 7f561000 00000001 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r4:00000001 r4:84b392c0 r4:84a4b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8939e08 r5:00001000 r4:e070f000 r5:850b038c r4:850b0000 r4:85087480 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:00000000 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:109:4014 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:109 state:D stack:0 pid:4014 tgid:4014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e893dd84 r8:00000002 r7:60000013 r6:e893dd8c r5:84a4bc00 r4:84a4bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a4bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e893de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507ba40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8967000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b278c r4:850b2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b278c r4:85087680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdd28 to 0xe04bdd70) r4:e04bddc0 r5:85ef678c r4:85ef6400 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:110:4015 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:110 state:D stack:0 pid:4015 tgid:4015 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84a4c800 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850b078c r4:850b0400 r7:dddced80 r6:83018000 r5:850b078c r4:85087580 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 task:kworker/0:111 state:D stack:0 pid:4018 tgid:4018 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507b040 r5:850b0b8c r4:850b0800 r4:85087800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8507b000 INFO: task kworker/0:111:4018 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 945e8000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:112:4020 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:112 state:D stack:0 pid:4020 tgid:4020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8949d84 r8:00000002 r7:60000013 r6:e8949d8c r5:84a4e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8949e08 r5:850b0f8c r4:850b0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 INFO: task kworker/0:112:4020 is blocked on a mutex likely owned by task kworker/1:221:3732. r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Not tainted 6.15.0-rc7-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e894de08 r5:850b138c r4:850b1000 r10:00000000 r9:85087880 r8:80287e08 r7:e893de60 r6:85087b80 r5:84a4ec00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe894dfb0 to 0xe894dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8507b2c0 INFO: task kworker/0:113:4023 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 94c70000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) Workqueue: events bpf_prog_free_deferred r4:00000000 r4:00000000 r5:850b178c r4:850b1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b392c0 r10:8291a684 r9:e8955d84 r8:00000002 r7:60000113 r6:e8955d8c r5:84bf0c00 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:850b1b8c r4:850b1800 r4:85087c00 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8507b600 INFO: task kworker/0:115:4027 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 95331000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:116:4028 blocked for more than 454 seconds. r5:84bf1800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507b780 r5:850b1f8c r4:850b1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85087d80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:00001000 r4:ed727000 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:117:4029 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:117 state:D stack:0 pid:4029 tgid:4029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8945d84 r8:00000002 r7:60000113 r6:e8945d8c r5:84bf2400 r4:84bf2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bf2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8945e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507b9c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bf2400 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8911000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b238c r4:850b2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b238c r4:85087e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bf2400 r8:85087e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85087e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85087e00 r8:80287e08 r7:e893de60 r6:85087e80 r5:84bf2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8945fb0 to 0xe8945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8507b600 INFO: task kworker/0:117:4029 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 95955000 dfdc7000 00000001 80239b98 7f561000 00000001 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 INFO: task kworker/0:118:4032 blocked for more than 454 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e895de08 r5:850b2b8c r4:850b2800 r10:61c88647 r9:84bf3000 r8:85079fac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe895dfb0 to 0xe895dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8507ba80 INFO: task kworker/0:118:4032 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 95fa3000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84b392c0 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b2f8c r4:850b2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b2f8c r4:85087f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bf3c00 r8:85087fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85087f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85087f80 r8:80287e08 r7:e895de60 r6:85087f00 r5:84bf3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8971fb0 to 0xe8971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8507bb40 INFO: task kworker/0:119:4034 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Workqueue: events bpf_prog_free_deferred r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8502d38c r4:8502d000 r7:ddde2d80 r6:83018200 r5:8502d38c r4:8507a900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bf5400 r8:8507a92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507a900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507a900 r8:80287e08 r7:e0771e60 r6:8508e100 r5:84bf5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b1fb0 to 0xe07b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) task:kworker/0:120 state:D stack:0 pid:4039 tgid:4039 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8502eb8c r4:8502e800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) INFO: task kworker/0:120:4039 is blocked on a mutex likely owned by task kworker/1:221:3732. Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 96528000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 r4:84bf4800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0859e08 r9:83018205 r8:84bf4800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 r5:8502d78c r4:8502d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:342:4044 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:342 state:D stack:0 pid:4044 tgid:4044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e48c1d84 r8:00000002 r7:60000013 r6:e48c1d8c r5:848e1800 r4:848e1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48c1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc7e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 r5:8502db8c r4:8502d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502db8c r4:8507aa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e1800 r8:8507aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507aa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507aa80 r8:80287e08 r7:e0859e60 r6:8508e300 r5:848e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48c1fb0 to 0xe48c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc7740 INFO: task kworker/1:342:4044 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 96ef6000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r5:80050013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r5:85ef678c r4:85ef6400 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0567000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8502ef8c r4:8502ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502ef8c r4:8507aa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e2400 r8:8507aa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507aa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507aa00 r8:80287e08 r7:e48c1e60 r6:8508e380 r5:848e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea989fb0 to 0xea989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:ea98dd84 r8:00000002 r7:60000013 r6:ea98dd8c r5:848e3000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea98de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8502df8c r4:8502dc00 r10:61c88647 r9:848e3000 r8:8507abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 96ef6000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:345:4048 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:345 state:D stack:0 pid:4048 tgid:4048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea991d84 r8:00000002 r7:60000013 r6:ea991d8c r5:848e0c00 r4:848e0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea991e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8502e38c r4:8502e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8507ab00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: 96f89000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:346:4050 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:346 state:D stack:0 pid:4050 tgid:4050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea999d84 r8:00000002 r7:60000113 r6:ea999d8c r5:848e4800 r4:848e4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea999e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507bf80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0455000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8502e78c r4:8502e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502e78c r4:8507ad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e4800 r8:8507ad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507ad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507ad00 r8:80287e08 r7:ea989e60 r6:8508e500 r5:848e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea999fb0 to 0xea999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc7500 INFO: task kworker/1:346:4050 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9752e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd60: 80230ad0 80239bb0 80050013 ffffffff r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 Exception stack(0xe04bdfb0 to 0xe04bdff8) Workqueue: events bpf_prog_free_deferred r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8507ac00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r4:e04bddc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:848e0000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e0000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850938c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8478c38c r4:8478c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8478c38c r4:8508e600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0000 r8:8508e62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8508e600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508e600 r8:80287e08 r7:e8971e60 r6:8508e680 r5:848e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a5fb0 to 0xea9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849cf7c0 INFO: task kworker/0:121:4054 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 978ba000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:348:4057 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:348 state:D stack:0 pid:4057 tgid:4057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9b1d84 r8:00000002 r7:60000113 r6:ea9b1d8c r5:848e5400 r4:848e5400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e5400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b19540 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8502ff8c r4:8502fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:348:4057 is blocked on a mutex likely owned by task kworker/1:221:3732. Exception stack(0xe04bdd28 to 0xe04bdd70) r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:349:4059 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:349 state:D stack:0 pid:4059 tgid:4059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9b9d84 r8:00000002 r7:60000113 r6:ea9b9d8c r5:84bf6c00 r4:84bf6c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bf6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b19280 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8502f78c r4:8502f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: 97fb5000 dfdc7000 00000001 80239b98 7f561000 00000001 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:350:4060 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:350 state:D stack:0 pid:4060 tgid:4060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9bdd84 r8:00000002 r7:60000113 r6:ea9bdd8c r5:848e6c00 r4:848e6c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9bde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b19480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0607000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8502fb8c r4:8502f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502fb8c r4:8507af00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e6c00 r8:8507af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507af00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507af00 r8:80287e08 r7:ea9b1e60 r6:8508e800 r5:848e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9bdfb0 to 0xea9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b194c0 INFO: task kworker/1:350:4060 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 97fb5000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Not tainted 6.15.0-rc7-syzkaller #0 r4:84bf8000 r5:84bf8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b195c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bf8000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8502af8c r4:8502ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502af8c r4:8478bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bf8000 r8:8478bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8478bf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478bf80 r8:80287e08 r7:ea9b1e60 r6:8508e880 r5:84bf8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c9fb0 to 0xea9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b19500 INFO: task kworker/1:351:4063 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd20: 982c2000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:352:4065 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:352 state:D stack:0 pid:4065 tgid:4065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9d1d84 r8:00000002 r7:60000013 r6:ea9d1d8c r5:84bfa400 r4:84bfa400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bfa400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bfa400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85031b8c r4:85031800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85031b8c r4:8484ab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bfa400 r8:8484abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8484ab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8484ab80 r8:80287e08 r7:ea9c9e60 r6:8508e900 r5:84bfa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d1fb0 to 0xea9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b19600 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: 98815000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:353:4066 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:353 state:D stack:0 pid:4066 tgid:4066 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9d5d84 r8:00000002 r7:60000113 r6:ea9d5d8c r5:84bfb000 r4:84bfb000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bfb000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b197c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bfb000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0667000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8503038c r4:85030000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8503038c r4:8507ae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bfb000 r8:8507aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507ae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507ae80 r8:80287e08 r7:ea9d1e60 r6:8508e980 r5:84bfb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d5fb0 to 0xea9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b19600 INFO: task kworker/1:353:4066 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 98815000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:354 state:D stack:0 pid:4069 tgid:4069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9e9d84 r8:00000002 r7:60000113 r6:ea9e9d8c r5:84bf9800 r4:84bf9800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bf9800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b19900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bf9800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0679000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8503078c r4:85030400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8503078c r4:85081000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bf9800 r8:8508102c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85081000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85081000 r8:80287e08 r7:ea9d1e60 r6:8508ea00 r5:84bf9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e9fb0 to 0xea9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b19700 INFO: task kworker/1:354:4069 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 98815000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:355:4071 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:355 state:D stack:0 pid:4071 tgid:4071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9f1d84 r8:00000002 r7:60000013 r6:ea9f1d8c r5:84bf8c00 r4:84bf8c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bf8c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b19a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bf8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e079d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85030b8c r4:85030800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85030b8c r4:85081080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bf8c00 r8:850810ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85081080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85081080 r8:80287e08 r7:ea9d1e60 r6:8508ea80 r5:84bf8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b19840 INFO: task kworker/1:355:4071 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 98d4f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:356:4072 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:356 state:D stack:0 pid:4072 tgid:4072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9f5d84 r8:00000002 r7:60000113 r6:ea9f5d8c r5:84bfd400 r4:84bfd400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bfd400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b19bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bfd400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85030f8c r4:85030c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85030f8c r4:85081200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bfd400 r8:8508122c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85081200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85081200 r8:80287e08 r7:ea9d1e60 r6:8508eb00 r5:84bfd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f5fb0 to 0xea9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b19980 INFO: task kworker/1:356:4072 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 98eab000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:357:4074 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:357 state:D stack:0 pid:4074 tgid:4074 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9fdd84 r8:00000002 r7:60000013 r6:ea9fdd8c r5:84bfc800 r4:84bfc800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bfc800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9fde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b19c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bfc800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8503138c r4:85031000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8503138c r4:85081100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bfc800 r8:8508112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85081100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85081100 r8:80287e08 r7:ea9d1e60 r6:8508eb80 r5:84bfc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9fdfb0 to 0xea9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b19b80 INFO: task kworker/1:357:4074 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 99227000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:4076 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:4076 tgid:4076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa05d84 r8:00000002 r7:60000013 r6:eaa05d8c r5:84bfe000 r4:84bfe000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bfe000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa05e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b19e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bfe000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8503178c r4:85031400 r10:61c88647 r9:84bfe000 r8:850812ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:00000001 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:359:4079 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:359 state:D stack:0 pid:4079 tgid:4079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa09d84 r8:00000002 r7:60000113 r6:eaa09d8c r5:84bfec00 r4:84bfec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bfec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa09e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bfec00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e084f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:84b392c0 Workqueue: events bpf_prog_free_deferred [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe8979fb0 to 0xe8979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85095100 INFO: task kworker/1:360:4080 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 99a22000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04bdfb0 to 0xe04bdff8) Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85081180 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:80050013 r4:80239bb0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe04bdfb0 to 0xe04bdff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:122 state:D stack:0 pid:4084 tgid:4084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa11d84 r8:00000002 r7:60000113 r6:eaa11d8c r5:85062400 r4:85062400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85062400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa11e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85062400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: 9a20d000 dfdc7000 00000001 80239b98 7f561000 00000001 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe04bdfb0 to 0xe04bdff8) Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85032b8c r4:85032800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85032b8c r4:85081680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85066c00 r8:850816ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85081680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85081680 r8:80287e08 r7:eaa09e60 r6:85081600 r5:85066c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa0dfb0 to 0xeaa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85095880 INFO: task kworker/1:362:4087 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9a20d000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:364:4092 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:364 state:D stack:0 pid:4092 tgid:4092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa15d84 r8:00000002 r7:60000113 r6:eaa15d8c r5:85068000 r4:85068000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85068000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa15e08 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:85095900 Exception stack(0xe04bdd28 to 0xe04bdd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000001 r4:84b392c0 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095c40 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe04bdd28 to 0xe04bdd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:366:4095 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:366 state:D stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa1dd84 r8:00000002 r7:60000113 r6:eaa1dd8c r5:85069800 r4:85069800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85069800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa1de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095dc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85069800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85033b8c r4:85033800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85033b8c r4:85081980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85069800 r8:850819ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85081980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85081980 r8:80287e08 r7:eaa19e60 r6:85081b00 r5:85069800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa1dfb0 to 0xeaa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85095c00 INFO: task kworker/1:366:4095 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeaa29fb0 to 0xeaa29ff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:368:4099 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:368 state:D stack:0 pid:4099 tgid:4099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa2dd84 r8:00000002 r7:60000113 r6:eaa2dd8c r5:8506b000 r4:8506b000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8506b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa2de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b19f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8506b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8503838c r4:85038000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8503838c r4:85081a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8506b000 r8:85081aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85081a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85081a80 r8:80287e08 r7:eaa29e60 r6:85081d00 r5:8506b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa2dfb0 to 0xeaa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85095f00 INFO: task kworker/1:368:4099 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:369:4102 blocked for more than 455 seconds. r4:8506bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa31e08 r5:00001000 r4:e8903000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85081b80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:849ffe00 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa35d84 r8:00000002 r7:60000013 r6:eaa35d8c r5:8506c800 r4:8506c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8506c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa35e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a3300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85038f8c r4:85038c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85038f8c r4:85081e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8506c800 r8:85081e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85081e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85081e00 r8:80287e08 r7:eaa31e60 r6:85081c80 r5:8506c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa35fb0 to 0xeaa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a30c0 INFO: task kworker/1:370:4103 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9b216000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:371:4105 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:371 state:D stack:0 pid:4105 tgid:4105 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8506d400 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e890d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa39fb0 to 0xeaa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a3240 INFO: task kworker/1:371:4105 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9b6c9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:372:4106 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:372 state:D stack:0 pid:4106 tgid:4106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa3dd84 r8:00000002 r7:60000113 r6:eaa3dd8c r5:8506ec00 r4:8506ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8506ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:df9f3000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:850a3340 Call trace: dd20: 9ba75000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r5:85ef678c r4:85ef6400 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 INFO: task kworker/1:373:4109 blocked for more than 455 seconds. [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eaa4b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8503938c r4:85039000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8503938c r4:8511b080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85070c00 r8:8511b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511b080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511b080 r8:80287e08 r7:eaa3de60 r6:8511b000 r5:85070c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06ddfb0 to 0xe06ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a35c0 INFO: task kworker/1:373:4109 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9ba75000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:374:4113 blocked for more than 455 seconds. Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a3900 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85070000 r8:8511b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 9bfaf000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:e04bddc0 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) INFO: task kworker/1:375:4114 blocked for more than 455 seconds. r4:85072400 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a3b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85072400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85039f8c r4:85039c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85039f8c r4:8511b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85072400 r8:8511b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511b280 r8:80287e08 r7:eaa49e60 r6:8511b380 r5:85072400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa55fb0 to 0xeaa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a3940 INFO: task kworker/1:375:4114 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9c311000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:376:4116 blocked for more than 455 seconds. Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85073000 r8:8511b1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: 9c311000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e00ad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8503ab8c r4:8503a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8503ab8c r4:8511b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85073c00 r8:8511b42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511b400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511b400 r8:80287e08 r7:eaa25e60 r6:8511b500 r5:85073c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa59fb0 to 0xeaa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850a3c40 INFO: task kworker/1:377:4118 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9c311000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/1:378:4119 blocked for more than 455 seconds. r4:85075400 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dff69000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8511b580 Exception stack(0xeaa61fb0 to 0xeaa61ff8) r4:850a3e80 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:379:4123 blocked for more than 455 seconds. r4:85076c00 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8503af8c r4:8503ac00 r7:ddde2d80 r6:83018200 r5:8503af8c r4:8511b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85076c00 r8:8511b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511b600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511b600 r8:80287e08 r7:eaa59e60 r6:8511b780 r5:85076c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa69fb0 to 0xeaa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509f080 INFO: task kworker/1:379:4123 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9cb99000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:123:4124 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:123 state:D stack:0 pid:4124 tgid:4124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa6dd84 r8:00000002 r7:60000113 r6:eaa6dd8c r5:85076000 r4:85076000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85076000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa6de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85076000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e050b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b3b8c r4:850b3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85076000 r8:8508eeac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ed727000 r4:849ffe00 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:380:4125 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:380 state:D stack:0 pid:4125 tgid:4125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa71d84 r8:00000002 r7:60000013 r6:eaa71d8c r5:8506e000 r4:8506e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8506e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa71e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509f640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0531000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8503b38c r4:8503b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8503b38c r4:8511b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8506e000 r8:8511b72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511b700 r8:80287e08 r7:eaa69e60 r6:8511b900 r5:8506e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa71fb0 to 0xeaa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509f340 INFO: task kworker/1:380:4125 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9d4e9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eaa5dd84 r8:00000002 r7:60000113 r6:eaa5dd8c r5:850e0000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:381:4130 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:381 state:D stack:0 pid:4130 tgid:4130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa65d84 r8:00000002 r7:60000013 r6:eaa65d8c r5:850e0c00 r4:850e0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa65e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509fa00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06fd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8503b78c r4:8503b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8503b78c r4:8511b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e0c00 r8:8511b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511b800 r8:80287e08 r7:eaa71e60 r6:8508ef00 r5:850e0c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ed727000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:382:4131 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:382 state:D stack:0 pid:4131 tgid:4131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa7dd84 r8:00000002 r7:60000113 r6:eaa7dd8c r5:850e3000 r4:850e3000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e3000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509fa80 r4:00000000 r5:00001000 r4:e070b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8503bb8c r4:8503b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8503bb8c r4:8511ba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e3000 r8:8511ba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511ba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511ba00 r8:80287e08 r7:eaa65e60 r6:85124100 r5:850e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa7dfb0 to 0xeaa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8509f540 INFO: task kworker/1:382:4131 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r5:80050013 r4:80239bb0 r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85120a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaacf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516238c r4:85162000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516238c r4:85124000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e3c00 r8:8512402c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85124000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124000 r8:80287e08 r7:ea9a5e60 r6:85124180 r5:850e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa81fb0 to 0xeaa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85093b00 INFO: task kworker/0:125:4134 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9df3b000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093500 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c838c r4:850c8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 9e3ff000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:e04bddc0 r5:00001000 r4:ed727000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0719000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c878c r4:850c8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c878c r4:85124280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e5400 r8:851242ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85124280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124280 r8:80287e08 r7:eaa81e60 r6:85124300 r5:850e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa8dfb0 to 0xeaa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85093740 INFO: task kworker/0:127:4137 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9e3ff000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:383:4140 blocked for more than 455 seconds. Workqueue: events bpf_prog_free_deferred r5:850e6c00 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e00a1000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c978c r4:850c9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c978c r4:85124400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e6000 r8:8512442c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85124400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124400 r8:80287e08 r7:eaa81e60 r6:85124580 r5:850e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa99fb0 to 0xeaa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85120140 INFO: task kworker/0:128:4142 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9ec8e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:384:4143 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:384 state:D stack:0 pid:4143 tgid:4143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa89d84 r8:00000002 r7:60000113 r6:eaa89d8c r5:85198c00 r4:85198c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85198c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa89e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509fd80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85198c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0747000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516038c r4:85160000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516038c r4:8511ba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85198c00 r8:8511baac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511ba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ed727000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:385 state:D stack:0 pid:4146 tgid:4146 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeaa9dfb0 to 0xeaa9dff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9eef0000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:386:4147 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:386 state:D stack:0 pid:4147 tgid:4147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa91d84 r8:00000002 r7:60000113 r6:eaa91d8c r5:8519a400 r4:8519a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa91e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509ff40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8519a400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0763000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516078c r4:85160400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeaa91fb0 to 0xeaa91ff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511f1c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8519b000 r8:8511bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:388:4152 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:388 state:D stack:0 pid:4152 tgid:4152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaab1d84 r8:00000002 r7:60000013 r6:eaab1d8c r5:8519bc00 r4:8519bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511f000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8519bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e079b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85160f8c r4:85160c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85160f8c r4:8511be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519bc00 r8:8511beac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511be80 r8:80287e08 r7:eaaa1e60 r6:8511bf80 r5:8519bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab1fb0 to 0xeaab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8511f2c0 INFO: task kworker/1:388:4152 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9f5bc000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:389:4154 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:389 state:D stack:0 pid:4154 tgid:4154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaaadd84 r8:00000002 r7:60000013 r6:eaaadd8c r5:8519c800 r4:8519c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaade08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516178c r4:85161400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8484af00 r8:80287e08 r7:eaaa1e60 r6:8511bd00 r5:8519c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaadfb0 to 0xeaaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8511f440 INFO: task kworker/1:389:4154 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9f5bc000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85161b8c r4:85161800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe04bdfb0 to 0xe04bdff8) INFO: task kworker/1:391:4158 blocked for more than 456 seconds. [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaabde08 r5:00001000 r4:eaac1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85161f8c r4:85161c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85161f8c r4:85127100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519e000 r8:8512712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85127100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127100 r8:80287e08 r7:eaab5e60 r6:85127280 r5:8519e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaabdfb0 to 0xeaabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8511f740 INFO: task kworker/1:391:4158 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9f952000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:392:4160 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8519ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:129:4163 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:129 state:D stack:0 pid:4163 tgid:4163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaacdd84 r8:00000002 r7:60000113 r6:eaacdd8c r5:85198000 r4:85198000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85198000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaacde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85120d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85198000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516d38c r4:8516d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516d38c r4:85124600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85198000 r8:8512462c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85124600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124600 r8:80287e08 r7:eaa99e60 r6:85127380 r5:85198000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaacdfb0 to 0xeaacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85120b80 INFO: task kworker/0:129:4163 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9fd1f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85074800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaadde08 r9:83018205 r8:85074800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaadf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85162b8c r4:85162800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85162b8c r4:85127500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85074800 r8:8512752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85127500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127500 r8:80287e08 r7:eaac5e60 r6:85127580 r5:85074800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaddfb0 to 0xeaaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8511f980 INFO: task kworker/1:393:4165 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 9ff68000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/1:394:4166 blocked for more than 456 seconds. r4:85071800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab9e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516338c r4:85163000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516338c r4:85127680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85071800 r8:851276ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85127680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127680 r8:80287e08 r7:eaadde60 r6:85127480 r5:85071800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab9fb0 to 0xeaab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8511fd40 INFO: task kworker/1:394:4166 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:851a8000 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85162f8c r4:85162c00 r10:61c88647 r9:851a8000 r8:8512742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a03ff000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:396:4170 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:396 state:D stack:0 pid:4170 tgid:4170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e48a5d84 r8:00000002 r7:60000113 r6:e48a5d8c r5:851a8c00 r4:851a8c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a8c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48a5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512d000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85163b8c r4:85163800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85163b8c r4:85127600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a8c00 r8:8512762c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85127600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127600 r8:80287e08 r7:eaab9e60 r6:85127700 r5:851a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48a5fb0 to 0xe48a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8511fe00 INFO: task kworker/1:396:4170 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a0738000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:397:4171 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:397 state:D stack:0 pid:4171 tgid:4171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea99dd84 r8:00000002 r7:60000013 r6:ea99dd8c r5:851a9800 r4:851a9800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a9800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea99de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511f7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516378c r4:85163400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516378c r4:85127800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a9800 r8:8512782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85127800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127800 r8:80287e08 r7:e48a5e60 r6:85127980 r5:851a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8511f580 INFO: task kworker/1:397:4171 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a0738000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:398:4174 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:398 state:D stack:0 pid:4174 tgid:4174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9a9d84 r8:00000002 r7:60000013 r6:ea9a9d8c r5:851aa400 r4:851aa400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851aa400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512d440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e044c000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516c38c r4:8516c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516c38c r4:85127880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851aa400 r8:851278ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85127880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127880 r8:80287e08 r7:e48a5e60 r6:85127a00 r5:851aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a9fb0 to 0xea9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512d240 INFO: task kworker/1:398:4174 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a0c50000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:399:4175 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:399 state:D stack:0 pid:4175 tgid:4175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9cdd84 r8:00000002 r7:60000013 r6:ea9cdd8c r5:851abc00 r4:851abc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851abc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512d140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e001f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85163f8c r4:85163c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85163f8c r4:85127a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851abc00 r8:85127aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85127a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127a80 r8:80287e08 r7:ea9a9e60 r6:85127900 r5:851abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9cdfb0 to 0xea9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512d2c0 INFO: task kworker/1:399:4175 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a101d000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:400:4177 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:400 state:D stack:0 pid:4177 tgid:4177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9d9d84 r8:00000002 r7:60000113 r6:ea9d9d8c r5:851ad400 r4:851ad400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ad400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512d640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0485000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516c78c r4:8516c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516c78c r4:85127b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ad400 r8:85127b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85127b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127b00 r8:80287e08 r7:ea9a9e60 r6:85127c80 r5:851ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d9fb0 to 0xea9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512d400 INFO: task kworker/1:400:4177 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a1a5e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:401:4180 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:401 state:D stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaaf5d84 r8:00000002 r7:60000013 r6:eaaf5d8c r5:851ae000 r4:851ae000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ae000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512da40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516cf8c r4:8516cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516cf8c r4:85127b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ae000 r8:85127bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85127b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127b80 r8:80287e08 r7:ea9d9e60 r6:85127d80 r5:851ae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf5fb0 to 0xeaaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512d600 INFO: task kworker/1:401:4180 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a1a5e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:402:4182 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:402 state:D stack:0 pid:4182 tgid:4182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaaf9d84 r8:00000002 r7:60000113 r6:eaaf9d8c r5:851ab000 r4:851ab000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ab000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512d840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0599000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516cb8c r4:8516c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516cb8c r4:85127c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ab000 r8:85127c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85127c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127c00 r8:80287e08 r7:eaaf5e60 r6:85127e80 r5:851ab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf9fb0 to 0xeaaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512d540 INFO: task kworker/1:402:4182 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a1a5e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:403:4184 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:403 state:D stack:0 pid:4184 tgid:4184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaafdd84 r8:00000002 r7:60000113 r6:eaafdd8c r5:851b0000 r4:851b0000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b0000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaafde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512df40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516d78c r4:8516d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516d78c r4:85127d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b0000 r8:85127d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85127d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127d00 r8:80287e08 r7:eaaf5e60 r6:85127f80 r5:851b0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaafdfb0 to 0xeaafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512da00 INFO: task kworker/1:403:4184 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a1a5e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:130:4187 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:130 state:D stack:0 pid:4187 tgid:4187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9c1d84 r8:00000002 r7:60000113 r6:ea9c1d8c r5:848e6000 r4:848e6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85140e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c938c r4:850c9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c938c r4:85124500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e6000 r8:8512452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85124500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124500 r8:80287e08 r7:eaa99e60 r6:85124480 r5:848e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c1fb0 to 0xea9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85120e00 INFO: task kworker/0:130:4187 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a2317000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:404:4189 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:404 state:D stack:0 pid:4189 tgid:4189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab09d84 r8:00000002 r7:60000113 r6:eab09d8c r5:850e2400 r4:850e2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab09e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513a380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516e78c r4:8516e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516e78c r4:85127f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e2400 r8:85127f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85127f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127f00 r8:80287e08 r7:eaafde60 r6:85124700 r5:850e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab09fb0 to 0xeab09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512df00 INFO: task kworker/1:404:4189 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a2317000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:405:4191 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:405 state:D stack:0 pid:4191 tgid:4191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab11d84 r8:00000002 r7:60000013 r6:eab11d8c r5:850e1800 r4:850e1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab11e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512dfc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516db8c r4:8516d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516db8c r4:85127180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e1800 r8:851271ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85127180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127180 r8:80287e08 r7:eab09e60 r6:85124680 r5:850e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab11fb0 to 0xeab11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513a080 INFO: task kworker/1:405:4191 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a2317000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:406:4192 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:406 state:D stack:0 pid:4192 tgid:4192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab15d84 r8:00000002 r7:60000113 r6:eab15d8c r5:851b8000 r4:851b8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513a040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516df8c r4:8516dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516df8c r4:85127e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b8000 r8:85127e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85127e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85127e00 r8:80287e08 r7:eab09e60 r6:85124780 r5:851b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab15fb0 to 0xeab15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513a080 INFO: task kworker/1:406:4192 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a2317000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:407:4194 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:407 state:D stack:0 pid:4194 tgid:4194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab1dd84 r8:00000002 r7:60000113 r6:eab1dd8c r5:851b9800 r4:851b9800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b9800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab1de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513a1c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516e38c r4:8516e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516e38c r4:8513c080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b9800 r8:8513c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513c080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c080 r8:80287e08 r7:eab09e60 r6:85124800 r5:851b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab1dfb0 to 0xeab1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513a2c0 INFO: task kworker/1:407:4194 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a2a85000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:408:4196 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:408 state:D stack:0 pid:4196 tgid:4196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab25d84 r8:00000002 r7:60000113 r6:eab25d8c r5:851b8c00 r4:851b8c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b8c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab25e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513a5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e083d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516ef8c r4:8516ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516ef8c r4:8513c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b8c00 r8:8513c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c000 r8:80287e08 r7:eab09e60 r6:85124880 r5:851b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab25fb0 to 0xeab25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513a180 INFO: task kworker/1:408:4196 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a2e72000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:409:4198 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:409 state:D stack:0 pid:4198 tgid:4198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab2dd84 r8:00000002 r7:60000013 r6:eab2dd8c r5:851ba400 r4:851ba400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ba400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab2de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513a180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e081f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516eb8c r4:8516e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516eb8c r4:8513c100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ba400 r8:8513c12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513c100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c100 r8:80287e08 r7:eab25e60 r6:85124900 r5:851ba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513a540 INFO: task kworker/1:409:4198 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a2e72000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:410:4201 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:410 state:D stack:0 pid:4201 tgid:4201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab39d84 r8:00000002 r7:60000013 r6:eab39d8c r5:851bb000 r4:851bb000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851bb000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab39e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513a980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48a2000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516fb8c r4:8516f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516fb8c r4:8513c200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851bb000 r8:8513c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513c200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c200 r8:80287e08 r7:eab25e60 r6:85124980 r5:851bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab39fb0 to 0xeab39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513a400 INFO: task kworker/1:410:4201 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a3345000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:411:4203 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:411 state:D stack:0 pid:4203 tgid:4203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab41d84 r8:00000002 r7:60000013 r6:eab41d8c r5:851bd400 r4:851bd400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851bd400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab41e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513a740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0851000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516f38c r4:8516f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516f38c r4:8513c380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851bd400 r8:8513c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513c380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c380 r8:80287e08 r7:eab39e60 r6:85124a00 r5:851bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab41fb0 to 0xeab41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513a700 INFO: task kworker/1:411:4203 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a3345000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:412:4204 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:412 state:D stack:0 pid:4204 tgid:4204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab45d84 r8:00000002 r7:60000013 r6:eab45d8c r5:851bc800 r4:851bc800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851bc800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab45e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513a800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0867000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516f78c r4:8516f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516f78c r4:8513c300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851bc800 r8:8513c32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513c300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c300 r8:80287e08 r7:eab39e60 r6:85124a80 r5:851bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab45fb0 to 0xeab45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513a700 INFO: task kworker/1:412:4204 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a3533000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:413:4206 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:413 state:D stack:0 pid:4206 tgid:4206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab4dd84 r8:00000002 r7:60000013 r6:eab4dd8c r5:851bbc00 r4:851bbc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851bbc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513ad40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517478c r4:85174400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517478c r4:8513c400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851bbc00 r8:8513c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513c400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c400 r8:80287e08 r7:eab39e60 r6:85124b00 r5:851bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab4dfb0 to 0xeab4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513a840 INFO: task kworker/1:413:4206 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a3533000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:414:4208 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:414 state:D stack:0 pid:4208 tgid:4208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab55d84 r8:00000002 r7:60000113 r6:eab55d8c r5:848d8000 r4:848d8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab55e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513aac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516ff8c r4:8516fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516ff8c r4:8513c280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d8000 r8:8513c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513c280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c280 r8:80287e08 r7:eab4de60 r6:85124b80 r5:848d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab55fb0 to 0xeab55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513a880 INFO: task kworker/1:414:4208 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a395e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:415:4210 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:415 state:D stack:0 pid:4210 tgid:4210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab5dd84 r8:00000002 r7:60000113 r6:eab5dd8c r5:848d9800 r4:848d9800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d9800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab5de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513ac00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517438c r4:85174000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517438c r4:8513c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d9800 r8:8513c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c480 r8:80287e08 r7:eab4de60 r6:85124c00 r5:848d9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab5dfb0 to 0xeab5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513aa00 INFO: task kworker/1:415:4210 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a395e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:4212 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:416 state:D stack:0 pid:4212 tgid:4212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab65d84 r8:00000002 r7:60000113 r6:eab65d8c r5:848d8c00 r4:848d8c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d8c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85156000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517578c r4:85175400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517578c r4:8513c180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d8c00 r8:8513c1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513c180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c180 r8:80287e08 r7:eab4de60 r6:85124c80 r5:848d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab65fb0 to 0xeab65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513ab40 INFO: task kworker/1:416:4212 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a40cb000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:417:4214 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:417 state:D stack:0 pid:4214 tgid:4214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab6dd84 r8:00000002 r7:60000013 r6:eab6dd8c r5:848dbc00 r4:848dbc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848dbc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513ae80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8907000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85174b8c r4:85174800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85174b8c r4:8513c580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848dbc00 r8:8513c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513c580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c580 r8:80287e08 r7:eab65e60 r6:85124d00 r5:848dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab6dfb0 to 0xeab6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513ac80 INFO: task kworker/1:417:4214 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a40cb000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:418:4216 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:418 state:D stack:0 pid:4216 tgid:4216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab05d84 r8:00000002 r7:60000113 r6:eab05d8c r5:851b0c00 r4:851b0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab05e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85120700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e897d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85174f8c r4:85174c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85174f8c r4:8513c600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b0c00 r8:8513c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513c600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c600 r8:80287e08 r7:eab65e60 r6:8513c700 r5:851b0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab05fb0 to 0xeab05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85120640 INFO: task kworker/1:418:4216 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a444f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:419:4218 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:419 state:D stack:0 pid:4218 tgid:4218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab71d84 r8:00000002 r7:60000113 r6:eab71d8c r5:851b2400 r4:851b2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab71e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849cfe80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea993000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517538c r4:85175000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517538c r4:8513c680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b2400 r8:8513c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513c680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c680 r8:80287e08 r7:eab65e60 r6:8513c800 r5:851b2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab71fb0 to 0xeab71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512de40 INFO: task kworker/1:419:4218 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a444f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:420:4221 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:420 state:D stack:0 pid:4221 tgid:4221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab75d84 r8:00000002 r7:60000013 r6:eab75d8c r5:851b3000 r4:851b3000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b3000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab75e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85156380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85175f8c r4:85175c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85175f8c r4:8513c500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b3000 r8:8513c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513c500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c500 r8:80287e08 r7:eab65e60 r6:8513c880 r5:851b3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab75fb0 to 0xeab75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85156240 INFO: task kworker/1:420:4221 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a44e9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:421:4222 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:421 state:D stack:0 pid:4222 tgid:4222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab01d84 r8:00000002 r7:60000113 r6:eab01d8c r5:851b3c00 r4:851b3c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b3c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85156140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85175b8c r4:85175800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85175b8c r4:8513c900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b3c00 r8:8513c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513c900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c900 r8:80287e08 r7:eab75e60 r6:8513c780 r5:851b3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab01fb0 to 0xeab01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85156240 INFO: task kworker/1:421:4222 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a4a1a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:422:4225 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:422 state:D stack:0 pid:4225 tgid:4225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab7dd84 r8:00000002 r7:60000013 r6:eab7dd8c r5:851b4800 r4:851b4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab7de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851564c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517638c r4:85176000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517638c r4:8513c980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b4800 r8:8513c9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513c980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c980 r8:80287e08 r7:eab75e60 r6:8513cb00 r5:851b4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85156340 INFO: task kworker/1:422:4225 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a4d3f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:423:4227 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:423 state:D stack:0 pid:4227 tgid:4227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab85d84 r8:00000002 r7:60000113 r6:eab85d8c r5:851b5400 r4:851b5400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b5400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85156600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa3f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517678c r4:85176400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517678c r4:8513ca00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b5400 r8:8513ca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513ca00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513ca00 r8:80287e08 r7:eab7de60 r6:8513cb80 r5:851b5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab85fb0 to 0xeab85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85156400 INFO: task kworker/1:423:4227 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a4d3f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:424:4229 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:424 state:D stack:0 pid:4229 tgid:4229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab89d84 r8:00000002 r7:60000113 r6:eab89d8c r5:851b6000 r4:851b6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85156780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa4d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85176b8c r4:85176800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85176b8c r4:8513cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b6000 r8:8513cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513cc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513cc00 r8:80287e08 r7:eab85e60 r6:8513cd00 r5:851b6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab89fb0 to 0xeab89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85156540 INFO: task kworker/1:424:4229 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a50c6000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:425:4231 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:425 state:D stack:0 pid:4231 tgid:4231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab8dd84 r8:00000002 r7:60000013 r6:eab8dd8c r5:851b6c00 r4:851b6c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab8de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851568c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaeb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85176f8c r4:85176c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85176f8c r4:8513ca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b6c00 r8:8513caac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513ca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513ca80 r8:80287e08 r7:eab89e60 r6:8513ce00 r5:851b6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab8dfb0 to 0xeab8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85156980 INFO: task kworker/1:425:4231 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a50c6000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:426:4233 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:426 state:D stack:0 pid:4233 tgid:4233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab91d84 r8:00000002 r7:60000113 r6:eab91d8c r5:851b1800 r4:851b1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85156ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab95000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517738c r4:85177000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517738c r4:8513cc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b1800 r8:8513ccac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513cc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513cc80 r8:80287e08 r7:eab8de60 r6:8513cd80 r5:851b1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab91fb0 to 0xeab91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85156800 INFO: task kworker/1:426:4233 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a54e9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:131:4240 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:131 state:D stack:0 pid:4240 tgid:4240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabb1d84 r8:00000002 r7:60000113 r6:eabb1d8c r5:84bfbc00 r4:84bfbc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bfbc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b33200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bfbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c9b8c r4:850c9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c9b8c r4:85124d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bfbc00 r8:85124dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85124d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124d80 r8:80287e08 r7:eaa99e60 r6:8507ad80 r5:84bfbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb1fb0 to 0xeabb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b33000 INFO: task kworker/0:131:4240 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a5968000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:132:4241 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:132 state:D stack:0 pid:4241 tgid:4241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabb5d84 r8:00000002 r7:60000013 r6:eabb5d8c r5:851aec00 r4:851aec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851aec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b33480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ca38c r4:850ca000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ca38c r4:85124e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851aec00 r8:85124e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85124e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124e00 r8:80287e08 r7:eabb1e60 r6:8513cf80 r5:851aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb5fb0 to 0xeabb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b33100 INFO: task kworker/0:132:4241 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a5968000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:427:4243 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:427 state:D stack:0 pid:4243 tgid:4243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabbdd84 r8:00000002 r7:60000113 r6:eabbdd8c r5:851c0c00 r4:851c0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85156b40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517778c r4:85177400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517778c r4:8513ce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c0c00 r8:8513ceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513ce80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513ce80 r8:80287e08 r7:eab91e60 r6:8513cf00 r5:851c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabbdfb0 to 0xeabbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8503f040 INFO: task kworker/1:427:4243 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a5cae000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:4244 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:4244 tgid:4244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabc1d84 r8:00000002 r7:60000013 r6:eabc1d8c r5:851c1800 r4:851c1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85156c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f011000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85177b8c r4:85177800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85177b8c r4:8511bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c1800 r8:8511bf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511bf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511bf00 r8:80287e08 r7:eabbde60 r6:84bc4000 r5:851c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc1fb0 to 0xeabc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8503f040 INFO: task kworker/1:428:4244 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a5cae000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:429:4245 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:429 state:D stack:0 pid:4245 tgid:4245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabc5d84 r8:00000002 r7:60000113 r6:eabc5d8c r5:851c2400 r4:851c2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512c340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac95000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518038c r4:85180000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518038c r4:84bc4080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c2400 r8:84bc40ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4080 r8:80287e08 r7:eabc1e60 r6:84bc4100 r5:851c2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc5fb0 to 0xeabc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8503f040 INFO: task kworker/1:429:4245 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a6204000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:430:4247 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:430 state:D stack:0 pid:4247 tgid:4247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabcdd84 r8:00000002 r7:60000113 r6:eabcdd8c r5:851c3c00 r4:851c3c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c3c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabcde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512c200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85177f8c r4:85177c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85177f8c r4:84bc4180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c3c00 r8:84bc41ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4180 r8:80287e08 r7:eabc5e60 r6:84bc4200 r5:851c3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabcdfb0 to 0xeabcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8503f040 INFO: task kworker/1:430:4247 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a658a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:133:4248 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:133 state:D stack:0 pid:4248 tgid:4248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaba9d84 r8:00000002 r7:60000013 r6:eaba9d8c r5:848db000 r4:848db000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848db000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b33280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848db000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e051f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c9f8c r4:850c9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c9f8c r4:85124f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848db000 r8:85124fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85124f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124f80 r8:80287e08 r7:eabb5e60 r6:85124e80 r5:848db000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba9fb0 to 0xeaba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b331c0 INFO: task kworker/0:133:4248 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a658a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:134:4250 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:134 state:D stack:0 pid:4250 tgid:4250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabb9d84 r8:00000002 r7:60000113 r6:eabb9d8c r5:848dc800 r4:848dc800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848dc800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b33440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ca78c r4:850ca400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ca78c r4:84bc0080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848dc800 r8:84bc00ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc0080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc0080 r8:80287e08 r7:eabb5e60 r6:84bc0000 r5:848dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb9fb0 to 0xeabb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b33440 INFO: task kworker/0:134:4250 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a6b37000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:135:4251 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:135 state:D stack:0 pid:4251 tgid:4251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab99d84 r8:00000002 r7:60000113 r6:eab99d8c r5:848dd400 r4:848dd400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848dd400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b33780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850cab8c r4:850ca800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850cab8c r4:84bc0100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848dd400 r8:84bc012c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc0100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc0100 r8:80287e08 r7:eabb9e60 r6:84bc0280 r5:848dd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab99fb0 to 0xeab99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b336c0 INFO: task kworker/0:135:4251 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a6b37000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:136:4254 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:136 state:D stack:0 pid:4254 tgid:4254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabd1d84 r8:00000002 r7:60000113 r6:eabd1d8c r5:848de000 r4:848de000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848de000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b33800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848de000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0717000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850caf8c r4:850cac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850caf8c r4:84bc0180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848de000 r8:84bc01ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc0180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc0180 r8:80287e08 r7:eab99e60 r6:84bc0300 r5:848de000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd1fb0 to 0xeabd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b33980 INFO: task kworker/0:136:4254 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a6b37000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:137:4257 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:137 state:D stack:0 pid:4257 tgid:4257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabd9d84 r8:00000002 r7:60000113 r6:eabd9d8c r5:848dec00 r4:848dec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848dec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b33a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0739000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850cb38c r4:850cb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850cb38c r4:84bc0380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848dec00 r8:84bc03ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc0380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc0380 r8:80287e08 r7:eabd1e60 r6:84bc0480 r5:848dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd9fb0 to 0xeabd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b33840 INFO: task kworker/0:137:4257 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a7027000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:138:4258 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:138 state:D stack:0 pid:4258 tgid:4258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabddd84 r8:00000002 r7:60000113 r6:eabddd8c r5:848da400 r4:848da400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848da400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabdde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b33d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848da400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e078f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850cbb8c r4:850cb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850cbb8c r4:84bc0200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848da400 r8:84bc022c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc0200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc0200 r8:80287e08 r7:eabd9e60 r6:84bc0400 r5:848da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabddfb0 to 0xeabddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b33840 INFO: task kworker/0:138:4258 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a73c8000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:139:4259 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:139 state:D stack:0 pid:4259 tgid:4259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabd5d84 r8:00000002 r7:60000113 r6:eabd5d8c r5:851bec00 r4:851bec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851bec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b33c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e075b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850cb78c r4:850cb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850cb78c r4:84bc0500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851bec00 r8:84bc052c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc0500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc0500 r8:80287e08 r7:eabdde60 r6:84bc0580 r5:851bec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd5fb0 to 0xeabd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b33840 INFO: task kworker/0:139:4259 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a73c8000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:140:4263 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:140 state:D stack:0 pid:4263 tgid:4263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabe1d84 r8:00000002 r7:60000113 r6:eabe1d8c r5:851be000 r4:851be000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851be000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b33e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851be000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e895f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850cbf8c r4:850cbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850cbf8c r4:84bc0600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851be000 r8:84bc062c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc0600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc0600 r8:80287e08 r7:eabdde60 r6:84bc0680 r5:851be000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe1fb0 to 0xeabe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b33d40 INFO: task kworker/0:140:4263 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a78ee000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:141:4264 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:141 state:D stack:0 pid:4264 tgid:4264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabe5d84 r8:00000002 r7:60000013 r6:eabe5d8c r5:84a80000 r4:84a80000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a80000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85151040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a80000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850dc38c r4:850dc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850dc38c r4:84bc0700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a80000 r8:84bc072c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc0700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc0700 r8:80287e08 r7:eabe1e60 r6:84bc0780 r5:84a80000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe5fb0 to 0xeabe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b33e40 INFO: task kworker/0:141:4264 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a7aee000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:142:4265 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:142 state:D stack:0 pid:4265 tgid:4265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabe9d84 r8:00000002 r7:60000113 r6:eabe9d8c r5:84a80c00 r4:84a80c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a80c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851406c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a80c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8975000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8478cb8c r4:8478c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8478cb8c r4:84bc0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a80c00 r8:84bc082c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc0800 r8:80287e08 r7:eabe5e60 r6:84bc0980 r5:84a80c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe9fb0 to 0xeabe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851403c0 INFO: task kworker/0:142:4265 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a7e64000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:143:4269 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:143 state:D stack:0 pid:4269 tgid:4269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabf1d84 r8:00000002 r7:60000113 r6:eabf1d8c r5:84a81800 r4:84a81800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a81800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85156c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a81800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8478c78c r4:8478c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8478c78c r4:84bc0880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a81800 r8:84bc08ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc0880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc0880 r8:80287e08 r7:eabe5e60 r6:84bc0a00 r5:84a81800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf1fb0 to 0xeabf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85151080 INFO: task kworker/0:143:4269 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a8191000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:144:4270 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:144 state:D stack:0 pid:4270 tgid:4270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabf9d84 r8:00000002 r7:60000113 r6:eabf9d8c r5:84a82400 r4:84a82400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a82400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851511c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a82400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850dc78c r4:850dc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850dc78c r4:84bc0b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a82400 r8:84bc0b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc0b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc0b00 r8:80287e08 r7:eabe5e60 r6:84bc0b80 r5:84a82400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf9fb0 to 0xeabf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851512c0 INFO: task kworker/0:144:4270 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a8191000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:145:4272 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:145 state:D stack:0 pid:4272 tgid:4272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabfdd84 r8:00000002 r7:60000013 r6:eabfdd8c r5:84a83000 r4:84a83000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a83000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85151380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a83000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850dcb8c r4:850dc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850dcb8c r4:84bc0a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a83000 r8:84bc0aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc0a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc0a80 r8:80287e08 r7:eabf9e60 r6:84bc0c00 r5:84a83000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabfdfb0 to 0xeabfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85151180 INFO: task kworker/0:145:4272 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a82d9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:146:4274 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:146 state:D stack:0 pid:4274 tgid:4274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac01d84 r8:00000002 r7:60000013 r6:eac01d8c r5:84a83c00 r4:84a83c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a83c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac01e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85151540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a83c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850dcf8c r4:850dcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850dcf8c r4:84bc0c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a83c00 r8:84bc0cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc0c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc0c80 r8:80287e08 r7:eabfde60 r6:84bc0900 r5:84a83c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac01fb0 to 0xeac01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85151180 INFO: task kworker/0:146:4274 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a8747000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:147:4277 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:147 state:D stack:0 pid:4277 tgid:4277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac11d84 r8:00000002 r7:60000113 r6:eac11d8c r5:84a84800 r4:84a84800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a84800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac11e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85151680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a84800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850dd38c r4:850dd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850dd38c r4:84bc0d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a84800 r8:84bc0d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc0d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc0d00 r8:80287e08 r7:eac01e60 r6:84bc0e00 r5:84a84800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac11fb0 to 0xeac11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85151500 INFO: task kworker/0:147:4277 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a890c000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:148:4278 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:148 state:D stack:0 pid:4278 tgid:4278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac19d84 r8:00000002 r7:60000013 r6:eac19d8c r5:84a85400 r4:84a85400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a85400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85151b80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a85400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ddf8c r4:850ddc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ddf8c r4:84bc0e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a85400 r8:84bc0eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bc0e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc0e80 r8:80287e08 r7:eac11e60 r6:84bc0d80 r5:84a85400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac19fb0 to 0xeac19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851515c0 INFO: task kworker/0:148:4278 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a8b2a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:149:4280 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:149 state:D stack:0 pid:4280 tgid:4280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabf5d84 r8:00000002 r7:60000013 r6:eabf5d8c r5:84a86000 r4:84a86000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a86000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85151880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a86000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850dd78c r4:850dd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850dd78c r4:85124f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a86000 r8:85124f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85124f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85124f00 r8:80287e08 r7:eac19e60 r6:8508ed80 r5:84a86000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf5fb0 to 0xeabf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85151a80 INFO: task kworker/0:149:4280 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a8df4000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:150:4281 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:150 state:D stack:0 pid:4281 tgid:4281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac2dd84 r8:00000002 r7:60000113 r6:eac2dd8c r5:84a86c00 r4:84a86c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a86c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85151900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a86c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac2f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ddb8c r4:850dd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ddb8c r4:840de980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a86c00 r8:840de9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:840de980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840de980 r8:80287e08 r7:eac19e60 r6:84bc0f00 r5:84a86c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac2dfb0 to 0xeac2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85151840 INFO: task kworker/0:150:4281 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a9025000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:151:4284 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:151 state:D stack:0 pid:4284 tgid:4284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac39d84 r8:00000002 r7:60000113 r6:eac39d8c r5:83b0d400 r4:83b0d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b0d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac39e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85151cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b0d400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850de38c r4:850de000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850de38c r4:85142100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b0d400 r8:8514212c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85142100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85142100 r8:80287e08 r7:eac19e60 r6:85142000 r5:83b0d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac39fb0 to 0xeac39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85151b40 INFO: task kworker/0:151:4284 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a92ea000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:152:4286 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:152 state:D stack:0 pid:4286 tgid:4286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac41d84 r8:00000002 r7:60000113 r6:eac41d8c r5:844a0000 r4:844a0000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a0000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac41e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f2680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850deb8c r4:850de800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850deb8c r4:85142080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a0000 r8:851420ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85142080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85142080 r8:80287e08 r7:eac39e60 r6:85142280 r5:844a0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac41fb0 to 0xeac41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85151b40 INFO: task kworker/0:152:4286 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a92ea000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:153:4288 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:153 state:D stack:0 pid:4288 tgid:4288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac4dd84 r8:00000002 r7:60000013 r6:eac4dd8c r5:844a0c00 r4:844a0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac4de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85151e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850de78c r4:850de400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850de78c r4:85142180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a0c00 r8:851421ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85142180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85142180 r8:80287e08 r7:eac41e60 r6:85142380 r5:844a0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac4dfb0 to 0xeac4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85151f40 INFO: task kworker/0:153:4288 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a98c3000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:154:4290 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:154 state:D stack:0 pid:4290 tgid:4290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac55d84 r8:00000002 r7:60000013 r6:eac55d8c r5:844a1800 r4:844a1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac55e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85133000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850def8c r4:850dec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850def8c r4:85142200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a1800 r8:8514222c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85142200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85142200 r8:80287e08 r7:eac41e60 r6:85142480 r5:844a1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac55fb0 to 0xeac55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85151e00 INFO: task kworker/0:154:4290 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a9978000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:155:4292 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:155 state:D stack:0 pid:4292 tgid:4292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac61d84 r8:00000002 r7:60000113 r6:eac61d8c r5:844a2400 r4:844a2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac61e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85133140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850df38c r4:850df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850df38c r4:85142300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a2400 r8:8514232c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85142300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85142300 r8:80287e08 r7:eac55e60 r6:85142500 r5:844a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac61fb0 to 0xeac61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85133240 INFO: task kworker/0:155:4292 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a9bbd000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:156:4294 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:156 state:D stack:0 pid:4294 tgid:4294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac69d84 r8:00000002 r7:60000013 r6:eac69d8c r5:844a3000 r4:844a3000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a3000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85133400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850df78c r4:850df400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850df78c r4:85142580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a3000 r8:851425ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85142580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85142580 r8:80287e08 r7:eac61e60 r6:85142400 r5:844a3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac69fb0 to 0xeac69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85133080 INFO: task kworker/0:156:4294 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: a9e59000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:157:4295 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:157 state:D stack:0 pid:4295 tgid:4295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabedd84 r8:00000002 r7:60000013 r6:eabedd8c r5:844a3c00 r4:844a3c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a3c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85133500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac7f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850dfb8c r4:850df800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850dfb8c r4:85142600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a3c00 r8:8514262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85142600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85142600 r8:80287e08 r7:eac69e60 r6:85142680 r5:844a3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabedfb0 to 0xeabedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85133080 INFO: task kworker/0:157:4295 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: aa097000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:158:4298 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:158 state:D stack:0 pid:4298 tgid:4298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac7dd84 r8:00000002 r7:60000113 r6:eac7dd8c r5:844a5400 r4:844a5400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a5400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85133580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850dff8c r4:850dfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850dff8c r4:85142700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a5400 r8:8514272c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85142700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85142700 r8:80287e08 r7:eabede60 r6:85142780 r5:844a5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac7dfb0 to 0xeac7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85133480 INFO: task kworker/0:158:4298 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: aa24d000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:159:4300 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:159 state:D stack:0 pid:4300 tgid:4300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac89d84 r8:00000002 r7:60000113 r6:eac89d8c r5:844a6000 r4:844a6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85133dc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d838c r4:851d8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d838c r4:85142800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a6000 r8:8514282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85142800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85142800 r8:80287e08 r7:eac7de60 r6:85142880 r5:844a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac89fb0 to 0xeac89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851335c0 INFO: task kworker/0:159:4300 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: aa38e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:431:4303 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:431 state:D stack:0 pid:4303 tgid:4303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacadd84 r8:00000002 r7:60000113 r6:eacadd8c r5:850f8c00 r4:850f8c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850f8c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacade08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512c3c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518078c r4:85180400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518078c r4:84bc4280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850f8c00 r8:84bc42ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4280 r8:80287e08 r7:eabc5e60 r6:85142900 r5:850f8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacadfb0 to 0xeacadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512c280 INFO: task kworker/1:431:4303 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: aa579000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:432:4304 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:432 state:D stack:0 pid:4304 tgid:4304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacb5d84 r8:00000002 r7:60000013 r6:eacb5d8c r5:850fa400 r4:850fa400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fa400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512c980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518178c r4:85181400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518178c r4:84bc4300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fa400 r8:84bc432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4300 r8:80287e08 r7:eacade60 r6:85142980 r5:850fa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb5fb0 to 0xeacb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512c280 INFO: task kworker/1:432:4304 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: aa7af000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:4306 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:433 state:D stack:0 pid:4306 tgid:4306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacb9d84 r8:00000002 r7:60000113 r6:eacb9d8c r5:850fb000 r4:850fb000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fb000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512c740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc7b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85180f8c r4:85180c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85180f8c r4:84bc4380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fb000 r8:84bc43ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4380 r8:80287e08 r7:eacb5e60 r6:85142a00 r5:850fb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb9fb0 to 0xeacb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512c280 INFO: task kworker/1:433:4306 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: aaa3d000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:160:4307 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:160 state:D stack:0 pid:4307 tgid:4307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacbdd84 r8:00000002 r7:60000113 r6:eacbdd8c r5:850f8000 r4:850f8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850f8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacbde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513ea40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab59000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d938c r4:851d9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d938c r4:85142a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850f8000 r8:85142aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85142a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85142a80 r8:80287e08 r7:eac89e60 r6:85142b00 r5:850f8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacbdfb0 to 0xeacbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85133c00 INFO: task kworker/0:160:4307 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: aaa3d000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:434:4311 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:434 state:D stack:0 pid:4311 tgid:4311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab31d84 r8:00000002 r7:60000113 r6:eab31d8c r5:850fc800 r4:850fc800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fc800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab31e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512c8c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfebd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518138c r4:85181000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518138c r4:84bc4400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fc800 r8:84bc442c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4400 r8:80287e08 r7:eacb5e60 r6:85142b80 r5:850fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab31fb0 to 0xeab31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512c800 INFO: task kworker/1:434:4311 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: aae67000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:435:4313 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:435 state:D stack:0 pid:4313 tgid:4313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacc9d84 r8:00000002 r7:60000113 r6:eacc9d8c r5:850fe000 r4:850fe000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fe000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512cd40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518238c r4:85182000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518238c r4:84bc4480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fe000 r8:84bc44ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4480 r8:80287e08 r7:eacb5e60 r6:85142c00 r5:850fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc9fb0 to 0xeacc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512c840 INFO: task kworker/1:435:4313 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: aae67000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:436:4315 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:436 state:D stack:0 pid:4315 tgid:4315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacd1d84 r8:00000002 r7:60000113 r6:eacd1d8c r5:850fd400 r4:850fd400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fd400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512cac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0467000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85181b8c r4:85181800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85181b8c r4:84bc4500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fd400 r8:84bc452c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4500 r8:80287e08 r7:eacc9e60 r6:85142d00 r5:850fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd1fb0 to 0xeacd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512c940 INFO: task kworker/1:436:4315 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ab1b3000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:161:4316 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:161 state:D stack:0 pid:4316 tgid:4316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacd5d84 r8:00000002 r7:60000113 r6:eacd5d8c r5:850f9800 r4:850f9800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850f9800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513e800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0807000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d878c r4:851d8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d878c r4:85142c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850f9800 r8:85142cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85142c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85142c80 r8:80287e08 r7:eacbde60 r6:85142d80 r5:850f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd5fb0 to 0xeacd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85133fc0 INFO: task kworker/0:161:4316 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ab3dd000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:437:4318 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:437 state:D stack:0 pid:4318 tgid:4318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacddd84 r8:00000002 r7:60000113 r6:eacddd8c r5:844a6c00 r4:844a6c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512cc00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0597000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85181f8c r4:85181c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85181f8c r4:84bc4600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a6c00 r8:84bc462c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4600 r8:80287e08 r7:eacc9e60 r6:85142e00 r5:844a6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacddfb0 to 0xeacddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512c940 INFO: task kworker/1:437:4318 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ab5d9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:438:4320 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:438 state:D stack:0 pid:4320 tgid:4320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eace5d84 r8:00000002 r7:60000113 r6:eace5d8c r5:850fbc00 r4:850fbc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fbc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512cfc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85182b8c r4:85182800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85182b8c r4:84bc4680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fbc00 r8:84bc46ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4680 r8:80287e08 r7:eacc9e60 r6:85142e80 r5:850fbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace5fb0 to 0xeace5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512cb40 INFO: task kworker/1:438:4320 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ab791000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:439:4322 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:439 state:D stack:0 pid:4322 tgid:4322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacedd84 r8:00000002 r7:60000113 r6:eacedd8c r5:844a4800 r4:844a4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512ce80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0639000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518278c r4:85182400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518278c r4:84bc4780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a4800 r8:84bc47ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4780 r8:80287e08 r7:eace5e60 r6:85142f00 r5:844a4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacedfb0 to 0xeacedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512cc80 INFO: task kworker/1:439:4322 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: aba41000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:440:4324 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:440 state:D stack:0 pid:4324 tgid:4324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacf5d84 r8:00000002 r7:60000113 r6:eacf5d8c r5:84a88c00 r4:84a88c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a88c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85133fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a88c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518338c r4:85183000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518338c r4:84bc4800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a88c00 r8:84bc482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4800 r8:80287e08 r7:eace5e60 r6:85142f80 r5:84a88c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf5fb0 to 0xeacf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512cdc0 INFO: task kworker/1:440:4324 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: abc91000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:4326 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:4326 tgid:4326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacfdd84 r8:00000002 r7:60000013 r6:eacfdd8c r5:84a88000 r4:84a88000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a88000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacfde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84578a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a88000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85182f8c r4:85182c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85182f8c r4:84bc4880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a88000 r8:84bc48ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4880 r8:80287e08 r7:eacf5e60 r6:84bc0f80 r5:84a88000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacfdfb0 to 0xeacfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512cf00 INFO: task kworker/1:441:4326 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ac000000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:4328 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:442 state:D stack:0 pid:4328 tgid:4328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead01d84 r8:00000002 r7:60000113 r6:ead01d8c r5:84a8a400 r4:84a8a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a8a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead01e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85146040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a8a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0847000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518378c r4:85183400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518378c r4:84bc4900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a8a400 r8:84bc492c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4900 r8:80287e08 r7:eacf5e60 r6:85148000 r5:84a8a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead01fb0 to 0xead01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85133ec0 INFO: task kworker/1:442:4328 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ac1e9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:162:4330 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:162 state:D stack:0 pid:4330 tgid:4330 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacf9d84 r8:00000002 r7:60000113 r6:eacf9d8c r5:84a8b000 r4:84a8b000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a8b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513ef00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a8b000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab0b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d8b8c r4:851d8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d8b8c r4:85148080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a8b000 r8:851480ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85148080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148080 r8:80287e08 r7:eacbde60 r6:85148200 r5:84a8b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf9fb0 to 0xeacf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513e7c0 INFO: task kworker/0:162:4330 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ac314000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:443:4332 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:443 state:D stack:0 pid:4332 tgid:4332 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead05d84 r8:00000002 r7:60000113 r6:ead05d8c r5:84a8bc00 r4:84a8bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a8bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead05e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85146180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a8bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0865000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85183b8c r4:85183800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85183b8c r4:84bc4700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a8bc00 r8:84bc472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4700 r8:80287e08 r7:ead01e60 r6:85148100 r5:84a8bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead05fb0 to 0xead05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8503f3c0 INFO: task kworker/1:443:4332 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ac89f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:444:4335 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:444 state:D stack:0 pid:4335 tgid:4335 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead11d84 r8:00000002 r7:60000113 r6:ead11d8c r5:84a8e000 r4:84a8e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a8e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead11e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85146200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a8e000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85183f8c r4:85183c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85183f8c r4:84bc4980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a8e000 r8:84bc49ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4980 r8:80287e08 r7:ead05e60 r6:85148180 r5:84a8e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead11fb0 to 0xead11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851460c0 INFO: task kworker/1:444:4335 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: aca40000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:445:4337 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:445 state:D stack:0 pid:4337 tgid:4337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead15d84 r8:00000002 r7:60000113 r6:ead15d8c r5:84a8c800 r4:84a8c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a8c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead15e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85146480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a8c800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48cf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8427c38c r4:8427c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8427c38c r4:84bc4580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a8c800 r8:84bc45ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4580 r8:80287e08 r7:ead11e60 r6:85148280 r5:84a8c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead15fb0 to 0xead15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85146240 INFO: task kworker/1:445:4337 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: acd52000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:4339 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:4339 tgid:4339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead19d84 r8:00000002 r7:60000013 r6:ead19d8c r5:84a8ec00 r4:84a8ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a8ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead19e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85146500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518438c r4:85184000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518438c r4:84bc4a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a8ec00 r8:84bc4a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4a00 r8:80287e08 r7:ead15e60 r6:85148300 r5:84a8ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead19fb0 to 0xead19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85146440 INFO: task kworker/1:446:4339 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: acff4000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:447:4341 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:447 state:D stack:0 pid:4341 tgid:4341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead1dd84 r8:00000002 r7:60000013 r6:ead1dd8c r5:84a8d400 r4:84a8d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a8d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85146740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e890f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518478c r4:85184400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518478c r4:84bc4b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a8d400 r8:84bc4bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4b80 r8:80287e08 r7:ead19e60 r6:85148380 r5:84a8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead1dfb0 to 0xead1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85146540 INFO: task kworker/1:447:4341 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ad1e8000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:448:4343 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:448 state:D stack:0 pid:4343 tgid:4343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacb1d84 r8:00000002 r7:60000113 r6:eacb1d8c r5:851c6000 r4:851c6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85146880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea995000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85184b8c r4:85184800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85184b8c r4:84bc4c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c6000 r8:84bc4c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4c00 r8:80287e08 r7:ead1de60 r6:84bc4c80 r5:851c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb1fb0 to 0xeacb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85146700 INFO: task kworker/1:448:4343 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ad494000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:449:4345 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:449 state:D stack:0 pid:4345 tgid:4345 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead0dd84 r8:00000002 r7:60000013 r6:ead0dd8c r5:851c6c00 r4:851c6c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead0de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851469c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85184f8c r4:85184c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85184f8c r4:84bc4a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c6c00 r8:84bc4aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4a80 r8:80287e08 r7:eacb1e60 r6:84bc4d00 r5:851c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead0dfb0 to 0xead0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85146680 INFO: task kworker/1:449:4345 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: adb9b000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:450:4347 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:450 state:D stack:0 pid:4347 tgid:4347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead21d84 r8:00000002 r7:60000013 r6:ead21d8c r5:851c4800 r4:851c4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead21e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85146c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518538c r4:85185000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518538c r4:84bc4d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c4800 r8:84bc4dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4d80 r8:80287e08 r7:ead0de60 r6:84bc4b00 r5:851c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead21fb0 to 0xead21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85146900 INFO: task kworker/1:450:4347 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: adb9b000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:451:4350 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:451 state:D stack:0 pid:4350 tgid:4350 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead25d84 r8:00000002 r7:60000013 r6:ead25d8c r5:851c0000 r4:851c0000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c0000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead25e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85146d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518578c r4:85185400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518578c r4:84bc4e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c0000 r8:84bc4e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4e00 r8:80287e08 r7:ead21e60 r6:84bc4f00 r5:851c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead25fb0 to 0xead25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85146680 INFO: task kworker/1:451:4350 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: adc05000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:452:4351 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:452 state:D stack:0 pid:4351 tgid:4351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead29d84 r8:00000002 r7:60000113 r6:ead29d8c r5:851c5400 r4:851c5400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c5400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead29e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85155000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85185b8c r4:85185800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85185b8c r4:84bc4f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c5400 r8:84bc4fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc4f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc4f80 r8:80287e08 r7:ead25e60 r6:84bc4e80 r5:851c5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead29fb0 to 0xead29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85146ac0 INFO: task kworker/1:452:4351 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: adfd7000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:453:4353 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:453 state:D stack:0 pid:4353 tgid:4353 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead2dd84 r8:00000002 r7:60000013 r6:ead2dd8c r5:851c8000 r4:851c8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead2de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85155380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab19000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85185f8c r4:85185c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85185f8c r4:85141100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c8000 r8:8514112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85141100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85141100 r8:80287e08 r7:ead29e60 r6:85141000 r5:851c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead2dfb0 to 0xead2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85155100 INFO: task kworker/1:453:4353 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ae14a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:454:4356 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:454 state:D stack:0 pid:4356 tgid:4356 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead35d84 r8:00000002 r7:60000013 r6:ead35d8c r5:851c8c00 r4:851c8c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c8c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead35e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85155600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab33000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518638c r4:85186000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518638c r4:85141080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c8c00 r8:851410ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85141080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85141080 r8:80287e08 r7:ead2de60 r6:85141280 r5:851c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead35fb0 to 0xead35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85155340 INFO: task kworker/1:454:4356 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ae4ee000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) INFO: task kworker/0:163:4357 blocked for more than 458 seconds. r4:851ca400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead31e08 r9:83018005 r8:851ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 r5:851d8f8c r4:851d8c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85148400 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:163:4357 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ae6e8000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:455:4359 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:455 state:D stack:0 pid:4359 tgid:4359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead3dd84 r8:00000002 r7:60000113 r6:ead3dd8c r5:851cbc00 r4:851cbc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851cbc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead3de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851558c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518678c r4:85186400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518678c r4:85141380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851cbc00 r8:851413ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:456:4361 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:456 state:D stack:0 pid:4361 tgid:4361 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead45d84 r8:00000002 r7:60000113 r6:ead45d8c r5:851cb000 r4:851cb000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851cb000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85155d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85186b8c r4:85186800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85186b8c r4:85141300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851cb000 r8:8514132c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85141300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85141300 r8:80287e08 r7:ead3de60 r6:85141500 r5:851cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead45fb0 to 0xead45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85155640 INFO: task kworker/1:456:4361 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ae99a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:851cd400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead49e08 r4:00000000 r5:85186f8c r4:85186c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85141400 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:164:4365 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:164 state:D stack:0 pid:4365 tgid:4365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac99d84 r8:00000002 r7:60000113 r6:eac99d8c r5:84a89800 r4:84a89800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a89800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85135640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a89800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d9f8c r4:851d9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d9f8c r4:85148580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a89800 r8:851485ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85148580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148580 r8:80287e08 r7:eacbde60 r6:85148500 r5:84a89800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac99fb0 to 0xeac99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513e580 INFO: task kworker/0:164:4365 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: aeec1000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ead39d84 r8:00000002 r7:60000113 r6:ead39d8c r5:850fec00 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85135500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d9b8c r4:851d9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d9b8c r4:85148600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fec00 r8:8514862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85148600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148600 r8:80287e08 r7:eac99e60 r6:85148480 r5:850fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead39fb0 to 0xead39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513e580 INFO: task kworker/0:165:4366 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: aef26000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85110c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85155e80 r5:8518738c r4:85187000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85141680 r8:80287e08 r7:ead49e60 r6:85148680 r5:85110c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:4371 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:459 state:D stack:0 pid:4371 tgid:4371 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead61d84 r8:00000002 r7:60000113 r6:ead61d8c r5:85112400 r4:85112400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85112400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead61e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85155f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85112400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead63000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518778c r4:85187400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518778c r4:85141580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85112400 r8:851415ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85141580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85141580 r8:80287e08 r7:ead59e60 r6:85148700 r5:85112400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead61fb0 to 0xead61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85155ec0 INFO: task kworker/1:459:4371 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: af571000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r5:00001000 r4:ed727000 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ead4dd84 r8:00000002 r7:60000113 r6:ead4dd8c r5:851c9800 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r9:83018205 r8:851c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85187f8c r4:85187c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85187f8c r4:85141780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c9800 r8:851417ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85141780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85141780 r8:80287e08 r7:ead61e60 r6:85141600 r5:851c9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead4dfb0 to 0xead4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85146e40 INFO: task kworker/1:460:4373 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: af719000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:461:4375 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:4375 tgid:4375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead6dd84 r8:00000002 r7:60000013 r6:ead6dd8c r5:851ce000 r4:851ce000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ce000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead6de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85146fc0 r9:83018205 r8:851ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:85187b8c r4:85187800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851ce000 r8:8514182c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: af7a3000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:e04bddc0 r5:00001000 r4:ed727000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 Workqueue: events bpf_prog_free_deferred r5:851cec00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85138600 r5:8518c78c r4:8518c400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) dd60: 80230ad0 80239bb0 80050013 ffffffff [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:463:4378 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:463 state:D stack:0 pid:4378 tgid:4378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead51d84 r8:00000002 r7:60000013 r6:ead51d8c r5:851cc800 r4:851cc800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851cc800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead51e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85138440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518c38c r4:8518c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518c38c r4:85141900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851cc800 r8:8514192c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85141900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85141900 r8:80287e08 r7:ead75e60 r6:85141980 r5:851cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead51fb0 to 0xead51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85138140 INFO: task kworker/1:463:4378 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: afd76000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:464:4384 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:464 state:D stack:0 pid:4384 tgid:4384 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac65d84 r8:00000002 r7:60000013 r6:eac65d8c r5:851c3000 r4:851c3000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851c3000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac65e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851387c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518cb8c r4:8518c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518cb8c r4:85141a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851c3000 r8:85141aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85141a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85141a80 r8:80287e08 r7:ead75e60 r6:85141b80 r5:851c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac65fb0 to 0xeac65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851385c0 INFO: task kworker/1:464:4384 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b011b000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:166:4386 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85208c00 r4:8291a680 r4:00000000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85208c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851db38c r4:851db000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851db38c r4:85148780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85208c00 r8:851487ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85148780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148780 r8:80287e08 r7:eac99e60 r6:85141c00 r5:85208c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac9dfb0 to 0xeac9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85135840 INFO: task kworker/0:166:4386 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b02be000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85209800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead85e08 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:85209800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851da78c r4:851da400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851da78c r4:85148900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85209800 r8:8514892c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85148900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148900 r8:80287e08 r7:eac9de60 r6:85141d00 r5:85209800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead85fb0 to 0xead85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85135840 INFO: task kworker/0:167:4387 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b0483000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8520a400 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:851da38c r4:85141b00 r10:00000000 r9:85141b00 r8:80287e08 r7:eac65e60 r6:85141c80 r5:8520a400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:465:4388 is blocked on a mutex likely owned by task kworker/1:221:3732. Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b0757000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:4390 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:466 state:D stack:0 pid:4390 tgid:4390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead8dd84 r8:00000002 r7:60000113 r6:ead8dd8c r5:8520bc00 r4:8520bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8520bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead8de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85138e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8520bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0749000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518cf8c r4:8518cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518cf8c r4:85141d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8520bc00 r8:85141dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85141d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85141d80 r8:80287e08 r7:eac25e60 r6:85141e00 r5:8520bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead8dfb0 to 0xead8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85138500 INFO: task kworker/1:466:4390 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 Exception stack(0xe04bdd28 to 0xe04bdd70) dd60: 80230ad0 80239bb0 80050013 ffffffff [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:168:4392 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:168 state:D stack:0 pid:4392 tgid:4392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead95d84 r8:00000002 r7:60000013 r6:ead95d8c r5:8520b000 r4:8520b000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8520b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85128040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e896b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518d78c r4:8518d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518d78c r4:85148800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8520b000 r8:8514882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85148800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148800 r8:80287e08 r7:eac9de60 r6:85141e80 r5:8520b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead95fb0 to 0xead95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851358c0 INFO: task kworker/0:168:4392 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b118a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85ef678c r4:85ef6400 r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) INFO: task kworker/1:467:4394 blocked for more than 459 seconds. r4:85208000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead99e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:e0795000 r5:8518d38c r4:8518d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518d38c r4:85130000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85208000 r8:8513002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85130000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85130000 r8:80287e08 r7:ead8de60 r6:85130080 r5:85208000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead99fb0 to 0xead99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85138c40 INFO: task kworker/1:467:4394 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b118a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:468:4396 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8518e38c r4:8518e000 r7:ddde2d80 r6:83018200 r5:8518e38c r4:85130100 r10:00000000 r9:85130100 r8:80287e08 r7:ead99e60 r6:85130280 r5:8520e000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80050013 r4:80239bb0 r4:e04bddc0 r5:00001000 r4:ed727000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:84b392c0 Not tainted 6.15.0-rc7-syzkaller #0 task:kworker/1:469 state:D stack:0 pid:4397 tgid:4397 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eada5d84 r8:00000002 r7:60000113 r6:eada5d8c r5:8520ec00 r4:8520ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8520ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85128580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8520ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518db8c r4:8518d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518db8c r4:85130180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8520ec00 r8:851301ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85130180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85130180 r8:80287e08 r7:ead9de60 r6:85130380 r5:8520ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada5fb0 to 0xeada5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85128180 INFO: task kworker/1:469:4397 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b1526000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) dd60: 80230ad0 80239bb0 80050013 ffffffff [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:170:4401 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:170 state:D stack:0 pid:4401 tgid:4401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadb1d84 r8:00000002 r7:60000113 r6:eadb1d8c r5:85210c00 r4:85210c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85210c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85135b40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85210c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac93000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851daf8c r4:851dac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851daf8c r4:85148880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85210c00 r8:851488ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85148880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148880 r8:80287e08 r7:eac9de60 r6:85130300 r5:85210c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb1fb0 to 0xeadb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85212400 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8518df8c r4:8518dc00 r10:61c88647 r9:85212400 r8:8513042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85130400 r8:80287e08 r7:ead9de60 r6:85130500 r5:85212400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:470:4404 is blocked on a mutex likely owned by task kworker/1:221:3732. Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b1d21000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:471:4406 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:471 state:D stack:0 pid:4406 tgid:4406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadb9d84 r8:00000002 r7:60000113 r6:eadb9d8c r5:85213000 r4:85213000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85213000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85128a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85213000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518e78c r4:8518e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518e78c r4:85130580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85213000 r8:851305ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85130580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe04bdfb0 to 0xe04bdff8) Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadade08 r5:00001000 r4:eac07000 r5:8518eb8c r4:8518e800 r10:61c88647 r9:85210000 r8:851304ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85130480 r8:80287e08 r7:eadb9e60 r6:85130600 r5:85210000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadadfb0 to 0xeadadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85128b40 INFO: task kworker/1:472:4409 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b269d000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:473:4411 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:473 state:D stack:0 pid:4411 tgid:4411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead81d84 r8:00000002 r7:60000113 r6:ead81d8c r5:85213c00 r4:85213c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85213c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead81e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8518ef8c r4:8518ec00 r7:ddde2d80 r6:83018200 r5:8518ef8c r4:85130700 r10:00000000 r9:85130700 r8:80287e08 r7:eadade60 r6:85130780 r5:85213c00 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 Not tainted 6.15.0-rc7-syzkaller #0 r4:85214800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85214800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85138340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518f78c r4:8518f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518f78c r4:85130800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85214800 r8:8513082c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85130800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85130800 r8:80287e08 r7:ead81e60 r6:85130980 r5:85214800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadbdfb0 to 0xeadbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85128c00 INFO: task kworker/1:474:4413 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b2e20000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:475:4414 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:475 state:D stack:0 pid:4414 tgid:4414 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaba1d84 r8:00000002 r7:60000013 r6:eaba1d8c r5:85215400 r4:85215400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85215400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85128e80 r5:8518f38c r4:8518f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:4417 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:476 state:D stack:0 pid:4417 tgid:4417 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadc1d84 r8:00000002 r7:60000013 r6:eadc1d8c r5:85216000 r4:85216000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85216000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851471c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85216000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8524838c r4:85248000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8524838c r4:85130a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85216000 r8:85130a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85130a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85130a00 r8:80287e08 r7:eadbde60 r6:85130b00 r5:85216000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc1fb0 to 0xeadc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85128780 INFO: task kworker/1:476:4417 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b303e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8518fb8c r4:8518f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85130b80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: b345d000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 Workqueue: events bpf_prog_free_deferred r4:85211800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85211800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85147080 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85211800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac6d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8518ff8c r4:8518fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518ff8c r4:85130c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85211800 r8:85130c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85130c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85130c00 r8:80287e08 r7:eadc1e60 r6:85130c80 r5:85211800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc9fb0 to 0xeadc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85147100 INFO: task kworker/1:478:4421 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b345d000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85ef678c r4:85ef6400 Exception stack(0xe04bdfb0 to 0xe04bdff8) INFO: task kworker/1:479:4422 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:479 state:D stack:0 pid:4422 tgid:4422 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadd1d84 r8:00000002 r7:60000013 r6:eadd1d8c r5:8520d400 r4:8520d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8520d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85147a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8520d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaded000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85248f8c r4:85248c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85248f8c r4:85130d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8520d400 r8:85130d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85130d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85130d00 r8:80287e08 r7:eadc1e60 r6:85130d80 r5:8520d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd1fb0 to 0xeadd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85147240 INFO: task kworker/1:479:4422 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b39c9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:4424 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:4424 tgid:4424 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadd5d84 r8:00000002 r7:60000113 r6:eadd5d8c r5:85218000 r4:85218000 r5:85218000 r4:8291a680 r4:00000000 r4:00000000 r5:8524878c r4:85248400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 Workqueue: events bpf_prog_free_deferred r5:85219800 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85248b8c r4:85248800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85219800 r8:85130f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85130f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85130f00 r8:80287e08 r7:eadd1e60 r6:85130f80 r5:85219800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadddfb0 to 0xeadddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85147640 INFO: task kworker/1:481:4426 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b3db4000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:171:4428 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8478d38c r4:8478d000 r7:dddced80 r6:83018000 r5:8478d38c r4:85148b00 r10:00000000 r9:85148b00 r8:80287e08 r7:eac9de60 r6:85141f00 r5:8521b000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:171:4428 is blocked on a mutex likely owned by task kworker/1:221:3732. Call trace: r4:00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b3db4000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:172:4429 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:172 state:D stack:0 pid:4429 tgid:4429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eade9d84 r8:00000002 r7:60000113 r6:eade9d8c r5:85218c00 r4:85218c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85218c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508c080 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85218c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851db78c r4:851db400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851db78c r4:85148a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85218c00 r8:85148aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85148a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148a80 r8:80287e08 r7:eade5e60 r6:85141f80 r5:85218c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade9fb0 to 0xeade9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b42d9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8524938c r4:85249000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85150100 r8:80287e08 r7:eadd1e60 r6:85150180 r5:8521c800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:e04bddc0 r4:00000000 r5:00001000 r4:ed727000 r5:85ef678c r4:85ef6400 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:4434 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:483 state:D stack:0 pid:4434 tgid:4434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eade1d84 r8:00000002 r7:60000113 r6:eade1d8c r5:8521bc00 r4:8521bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8521bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514e040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8521bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85249b8c r4:85249800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85249b8c r4:85150000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521bc00 r8:8515002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85150000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85150000 r8:80287e08 r7:eadf5e60 r6:85150280 r5:8521bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade1fb0 to 0xeade1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85147cc0 INFO: task kworker/1:483:4434 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b49c4000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:8521d400 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85147f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8521d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadfd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8524978c r4:85249400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8524978c r4:85150080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521d400 r8:851500ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85150080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85150080 r8:80287e08 r7:eade1e60 r6:85150200 r5:8521d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae01fb0 to 0xeae01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85147cc0 INFO: task kworker/1:484:4435 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b49c4000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:4438 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:4438 tgid:4438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadcdd84 r8:00000002 r7:60000113 r6:eadcdd8c r5:8521e000 r4:8521e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8521e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadcde08 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8521e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae2b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8524a78c r4:8524a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8524a78c r4:85150300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521e000 r8:8515032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85150300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85150300 r8:80287e08 r7:eade1e60 r6:85150400 r5:8521e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadcdfb0 to 0xeadcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8514e0c0 INFO: task kworker/1:485:4438 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b4bca000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:4439 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadd9d84 r8:00000002 r7:60000013 r6:eadd9d8c r5:8521a400 r4:8521a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8521a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514e1c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8521a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85249f8c r4:85249c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85249f8c r4:85150480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521a400 r8:851504ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85150480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85150480 r8:80287e08 r7:eadcde60 r6:85150580 r5:8521a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd9fb0 to 0xeadd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8514e180 INFO: task kworker/1:486:4439 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b4f1f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:487:4441 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:487 state:D stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae19d84 r8:00000002 r7:60000013 r6:eae19d8c r5:85113000 r4:85113000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85113000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae19e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514e4c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85113000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8524a38c r4:8524a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8524a38c r4:85150380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85113000 r8:851503ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85150380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85150380 r8:80287e08 r7:eadcde60 r6:85148b80 r5:85113000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae19fb0 to 0xeae19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8514e180 INFO: task kworker/1:487:4441 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b4f1f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:488:4443 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:488 state:D stack:0 pid:4443 tgid:4443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae11d84 r8:00000002 r7:60000013 r6:eae11d8c r5:85114800 r4:85114800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85114800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae11e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514e680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85114800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae31000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8524ab8c r4:8524a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8524ab8c r4:85150500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85114800 r8:8515052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85150500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85150500 r8:80287e08 r7:eadcde60 r6:85148980 r5:85114800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae11fb0 to 0xeae11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8514e480 INFO: task kworker/1:488:4443 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b55e2000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:173:4445 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:173 state:D stack:0 pid:4445 tgid:4445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae35d84 r8:00000002 r7:60000113 r6:eae35d8c r5:85115400 r4:85115400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85115400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae35e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508c2c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85115400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851dbb8c r4:851db800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851dbb8c r4:85148d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85115400 r8:85148d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85148d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148d00 r8:80287e08 r7:eade5e60 r6:85148c00 r5:85115400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae35fb0 to 0xeae35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508c180 INFO: task kworker/0:173:4445 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b55e2000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:e04bddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:489:4448 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:489 state:D stack:0 pid:4448 tgid:4448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae25d84 r8:00000002 r7:60000113 r6:eae25d8c r5:8520c800 r4:8520c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b55e2000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85220c00 r8:8515082c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b5955000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b5c90000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85220000 r8:85148cac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:174:4457 is blocked on a mutex likely owned by task kworker/1:221:3732. r4:e04bddc0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:e07d1000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e8b8c r4:851e8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851e8b8c r4:85148e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85223000 r8:85148eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85148e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148e80 r8:80287e08 r7:eae6de60 r6:85150a00 r5:85223000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae71fb0 to 0xeae71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508c6c0 INFO: task kworker/0:175:4458 is blocked on a mutex likely owned by task kworker/1:221:3732. dd20: b62bf000 dfdc7000 00000001 80239b98 7f561000 00000001 r5:00001000 r4:ed727000 r4:849ffe00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b62bf000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 r4:84b392c0 Workqueue: events bpf_prog_free_deferred r5:85224800 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85224800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8524bf8c r4:8524bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8524bf8c r4:85150980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85224800 r8:851509ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85150980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85150980 r8:80287e08 r7:eae4de60 r6:85150b00 r5:85224800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae7dfb0 to 0xeae7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85147f00 INFO: task kworker/1:492:4461 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b62bf000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 task:kworker/1:493 state:D stack:0 pid:4462 tgid:4462 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85131d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85225400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8524bb8c r4:8524b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8524bb8c r4:85150b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85225400 r8:85150bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85150b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85150b80 r8:80287e08 r7:eae7de60 r6:85150c00 r5:85225400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae81fb0 to 0xeae81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85131080 INFO: task kworker/1:493:4462 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b6821000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r4:85226c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae8de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508c900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85226c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e878c r4:851e8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851e878c r4:85148f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85226c00 r8:85148fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85148f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148f80 r8:80287e08 r7:eae71e60 r6:85150c80 r5:85226c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae8dfb0 to 0xeae8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508c740 INFO: task kworker/0:177:4464 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b6ba1000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:178:4466 blocked for more than 460 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae95d84 r8:00000002 r7:60000113 r6:eae95d8c r5:8521ec00 r4:8521ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8521ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae95e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514ecc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeae9dfb0 to 0xeae9dff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:180:4470 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:180 state:D stack:0 pid:4470 tgid:4470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaea5d84 r8:00000002 r7:60000113 r6:eaea5d8c r5:85228000 r4:85228000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85228000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508cc00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85228000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 r5:00001000 r4:e0849000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd20: b7119000 dfdc7000 00000001 80239b98 7f561000 00000001 r5:00001000 r4:ed727000 r4:849ffe00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:181:4472 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:181 state:D stack:0 pid:4472 tgid:4472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaeadd84 r8:00000002 r7:60000113 r6:eaeadd8c r5:8522b000 r4:8522b000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8522b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeade08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508cdc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8522b000 r8:8514a22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 INFO: task kworker/0:182:4475 blocked for more than 460 seconds. [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851e9f8c r4:851e9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851e9f8c r4:8514a280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8522a400 r8:8514a2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8514a280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514a280 r8:80287e08 r7:eae95e60 r6:85150f00 r5:8522a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec5fb0 to 0xeaec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8514ef80 INFO: task kworker/0:182:4475 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b7965000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508ce40 INFO: task kworker/0:183:4477 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b7b76000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84b392c0 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85116c00 r8:8514a42c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b7b76000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r9:83018205 r8:85111800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 r7:ddde2d80 r6:83018200 r5:851eab8c r4:85092100 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:82ac21e4 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:185:4483 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:185 state:D stack:0 pid:4483 tgid:4483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaed1d84 r8:00000002 r7:60000113 r6:eaed1d8c r5:85110000 r4:85110000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85110000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85110000 r8:8514a12c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:849ffe00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8514a480 r8:80287e08 r7:eaed1e60 r6:8514a600 r5:85116000 Call trace: r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b855e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:847b8000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525c38c r4:8525c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8525c38c r4:85092180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847b8000 r8:850921ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85092180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85092180 r8:80287e08 r7:eaee1e60 r6:8514a700 r5:847b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee5fb0 to 0xeaee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85131d80 INFO: task kworker/1:496:4488 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b88a0000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Exception stack(0xe04bdfb0 to 0xe04bdff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511db00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851eb38c r4:851eb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851eb38c r4:8514a780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847b8c00 r8:8514a7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8514a780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514a780 r8:80287e08 r7:eaed1e60 r6:8514a900 r5:847b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee9fb0 to 0xeaee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8511d680 INFO: task kworker/0:187:4490 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b88a0000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:188 state:D stack:0 pid:4494 tgid:4494 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae49e08 r9:83018005 r8:847bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:847bb000 r8:8514a82c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaef5d84 r8:00000002 r7:60000113 r6:eaef5d8c r5:847bbc00 r4:847bbc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847bbc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511dec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ebf8c r4:851ebc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851ebf8c r4:8514a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847bbc00 r8:8514a9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8514a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514a980 r8:80287e08 r7:eaed1e60 r6:8514aa80 r5:847bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef5fb0 to 0xeaef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8511de80 INFO: task kworker/0:189:4498 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b8ad0000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:190:4499 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:190 state:D stack:0 pid:4499 tgid:4499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaeddd84 r8:00000002 r7:60000013 r6:eaeddd8c r5:847bc800 r4:847bc800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847bc800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaedde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511d6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaccd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f038c r4:851f0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f038c r4:8514ab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847bc800 r8:8514ab2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8514ab00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514ab00 r8:80287e08 r7:eaef5e60 r6:8514aa00 r5:847bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeddfb0 to 0xeaeddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8511de80 INFO: task kworker/0:190:4499 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b915d000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:847bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:192:4502 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:192 state:D stack:0 pid:4502 tgid:4502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaef9d84 r8:00000002 r7:60000013 r6:eaef9d8c r5:847be000 r4:847be000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847be000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847be000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f0b8c r4:851f0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f0b8c r4:8514ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847be000 r8:8514acac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8514ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514ac80 r8:80287e08 r7:eaf01e60 r6:8514ad80 r5:847be000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef9fb0 to 0xeaef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85084240 INFO: task kworker/0:192:4502 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b94d6000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ba400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf0de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084480 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8514ae00 Exception stack(0xeaf0dfb0 to 0xeaf0dff8) INFO: task kworker/0:193:4504 is blocked on a mutex likely owned by task kworker/1:221:3732. Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:194:4506 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:194 state:D stack:0 pid:4506 tgid:4506 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf05d84 r8:00000002 r7:60000113 r6:eaf05d8c r5:85288000 r4:85288000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85288000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf05e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85288000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f138c r4:851f1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f138c r4:85148e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85288000 r8:85148e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85148e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148e00 r8:80287e08 r7:eaf0de60 r6:85148f00 r5:85288000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf05fb0 to 0xeaf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85084440 INFO: task kworker/0:194:4506 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b9a55000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:195:4508 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:195 state:D stack:0 pid:4508 tgid:4508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf31d84 r8:00000002 r7:60000013 r6:eaf31d8c r5:85289800 r4:85289800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85289800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf31e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084a40 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85289800 r8:850a002c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:196:4509 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:196 state:D stack:0 pid:4509 tgid:4509 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf3dd84 r8:00000002 r7:60000113 r6:eaf3dd8c r5:8522e000 r4:8522e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8522e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf3de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:00001000 r4:ead5b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f178c r4:851f1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f178c r4:850a0100 r10:61c88647 r9:8522e000 r8:850a012c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a0100 r10:00000000 r9:850a0100 r8:80287e08 r7:eaf31e60 r6:85092200 r5:8522e000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:4511 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf45d84 r8:00000002 r7:60000113 r6:eaf45d8c r5:8522ec00 r4:8522ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8522ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf45e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84858440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8522ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeeb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525c78c r4:8525c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8525c78c r4:85092300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8522ec00 r8:8509232c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85092300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85092300 r8:80287e08 r7:eaee1e60 r6:85092080 r5:8522ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf45fb0 to 0xeaf45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85131880 INFO: task kworker/1:497:4511 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: b9f5e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e04bddc0 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe04bdfb0 to 0xe04bdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8522d400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf49e08 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8522d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f1b8c r4:851f1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f1b8c r4:850a0280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8522d400 r8:850a02ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a0280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0280 r8:80287e08 r7:eaf31e60 r6:85092280 r5:8522d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf49fb0 to 0xeaf49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85084980 INFO: task kworker/0:197:4512 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ba342000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8522c800 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850a0180 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd20: ba810000 dfdc7000 00000001 80239b98 7f561000 00000001 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8522bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae89000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f238c r4:851f2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f238c r4:850a0200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8522bc00 r8:850a022c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850a0200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a0200 r8:80287e08 r7:eaf6de60 r6:85092400 r5:8522bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf75fb0 to 0xeaf75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85084b80 INFO: task kworker/0:199:4516 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ba810000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:200:4518 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:8528a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaefde08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850a0400 r8:80287e08 r7:eaf6de60 r6:850a0380 r5:8528a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849ffe00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:4522 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:4522 tgid:4522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf7dd84 r8:00000002 r7:60000113 r6:eaf7dd8c r5:8528c800 r4:8528c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8528c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf7de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848589c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8528c800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525db8c r4:8525d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8525db8c r4:85092480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8528c800 r8:850924ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85092480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85092480 r8:80287e08 r7:eaee1e60 r6:850a0300 r5:8528c800 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdd28 to 0xe04bdd70) r4:e04bddc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e004d000 r7:ddde2d80 r6:83018200 r5:8525d38c r4:85092500 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:849ffe00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:500:4525 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:500 state:D stack:0 pid:4525 tgid:4525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf89d84 r8:00000002 r7:60000013 r6:eaf89d8c r5:8528bc00 r4:8528bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8528bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84858940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8528bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0501000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525d78c r4:8525d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8525d78c r4:85092580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8528bc00 r8:850925ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85092580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85092580 r8:80287e08 r7:eaf7de60 r6:850a0500 r5:8528bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf89fb0 to 0xeaf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848587c0 INFO: task kworker/1:500:4525 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: bb4f5000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:82ac21e4 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8528b000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeaf91fb0 to 0xeaf91ff8) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849ffe00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:502:4529 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:502 state:D stack:0 pid:4529 tgid:4529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf99d84 r8:00000002 r7:60000013 r6:eaf99d8c r5:8528e000 r4:8528e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8528e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf99e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84858ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8528e000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0711000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525df8c r4:8525dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8525df8c r4:85092700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8528e000 r8:8509272c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85092700 r10:00000000 r9:85092700 r8:80287e08 r7:eaf91e60 r6:850a0600 r5:8528e000 Call trace: dd60: 80230ad0 80239bb0 80050013 ffffffff r5:00001000 r4:ed727000 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Call trace: r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8528ec00 r8:850926ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: bbb4a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) INFO: task kworker/1:504:4533 blocked for more than 461 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa9e08 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84858e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85288c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8969000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525e78c r4:8525e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8525e78c r4:85092880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85288c00 r8:850928ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85092880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85092880 r8:80287e08 r7:eaf91e60 r6:850a0700 r5:85288c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa9fb0 to 0xeafa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b392c0 r10:8291a684 r9:eafb5d84 r8:00000002 r7:60000013 r6:eafb5d8c r5:84510c00 r4:00000000 r5:8525eb8c r4:8525e800 r10:61c88647 r9:84510c00 r8:8509282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84858d40 Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: bbd46000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84511800 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512a040 r5:8525f78c r4:8525f400 r10:61c88647 r9:84511800 r8:8509292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e04bddc0 r5:85ef678c r4:85ef6400 Exception stack(0xe04bdfb0 to 0xe04bdff8) Workqueue: events bpf_prog_free_deferred [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:851f2b8c r4:851f2800 r4:850a0880 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: bc90f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8525f38c r4:8525f000 r4:00000001 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000001 r4:84b392c0 Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512a200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84513c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac31000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525fb8c r4:8525f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8525fb8c r4:85092a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84513c00 r8:85092aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85092a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85092a80 r8:80287e08 r7:eafb9e60 r6:850a0980 r5:84513c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc1fb0 to 0xeafc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512a100 INFO: task kworker/1:508:4544 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: bd2b7000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b392c0 Call trace: r5:84514800 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8427c78c r4:8427c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8427c78c r4:85092b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84514800 r8:85092b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85092b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85092b00 r8:80287e08 r7:eafc1e60 r6:850a0a80 r5:84514800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc5fb0 to 0xeafc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512a000 INFO: task kworker/1:509:4546 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84515400 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8525ff8c r4:8525fc00 r10:61c88647 r9:84515400 r8:85092bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8512a000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:e04bddc0 r5:00001000 r4:ed727000 r4:849ffe00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84516000 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8526038c r4:85260000 r4:85092980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85092980 r8:80287e08 r7:eafc5e60 r6:850a0b80 r5:84516000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafcdfb0 to 0xeafcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512a440 INFO: task kworker/1:511:4550 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: bdd0b000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:84b392c0 r10:8291a684 r9:eafd5d84 r8:00000002 r7:60000113 r6:eafd5d8c r5:84510000 r4:00000000 r5:8526138c r4:85261000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafdde08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526078c r4:85260400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526078c r4:85092d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85113c00 r8:85092d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85092d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85092d00 r8:80287e08 r7:eafd5e60 r6:850a0c80 r5:85113c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafddfb0 to 0xeafddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512a6c0 INFO: task kworker/1:513:4554 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: be8bc000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 task:kworker/1:514 state:D stack:0 pid:4555 tgid:4555 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512a840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84516c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85260b8c r4:85260800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85260b8c r4:85092d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84516c00 r8:85092dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85092d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85092d80 r8:80287e08 r7:eafd5e60 r6:850a0d00 r5:84516c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe1fb0 to 0xeafe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512a6c0 INFO: task kworker/1:514:4555 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: bee20000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85260f8c r4:85092e00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 INFO: task kworker/1:516:4560 blocked for more than 461 seconds. [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85223c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526178c r4:85261400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526178c r4:85092c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85223c00 r8:85092cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85092c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85092c80 r8:80287e08 r7:eafd5e60 r6:85092f00 r5:85223c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe5fb0 to 0xeafe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512a8c0 INFO: task kworker/1:516:4560 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) INFO: task kworker/1:517:4562 blocked for more than 461 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08 r5:85261b8c r4:85261800 r10:61c88647 r9:85230000 r8:85092fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:85ef678c r4:85ef6400 r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:518 state:D stack:0 pid:4565 tgid:4565 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb005d84 r8:00000002 r7:60000013 r6:eb005d8c r5:85290c00 r4:85290c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85290c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512af00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85290c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85261f8c r4:85261c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85261f8c r4:85097100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85290c00 r8:8509712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85097100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097100 r8:80287e08 r7:eafede60 r6:850a0d80 r5:85290c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb005fb0 to 0xeb005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512ad80 INFO: task kworker/1:518:4565 is blocked on a mutex likely owned by task kworker/1:221:3732. r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:519:4566 blocked for more than 461 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r5:8526338c r4:85263000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80050013 ffffffff r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:520:4567 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:520 state:D stack:0 pid:4567 tgid:4567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb00dd84 r8:00000002 r7:60000113 r6:eb00dd8c r5:85292400 r4:85292400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85292400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb00de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018205 r8:85292400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 r7:ddde2d80 r6:83018200 r5:8526238c r4:85097080 dfa0: 00000000 00000000 00000000 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:521:4570 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:521 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb019d84 r8:00000002 r7:60000113 r6:eb019d8c r5:85291800 r4:85291800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85291800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb019e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc5040 r4:00000000 r9:83018205 r8:85291800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r5:8526278c r4:85262400 r4:00000001 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85294800 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r7:ddde2d80 r6:83018200 r5:85262b8c r4:85097280 r10:61c88647 r9:85294800 r8:850972ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85097280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097280 r8:80287e08 r7:eb009e60 r6:850a0f80 r5:85294800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb01dfb0 to 0xeb01dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc5100 INFO: task kworker/1:522:4571 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c113e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:523 state:D stack:0 pid:4574 tgid:4574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb029d84 r8:00000002 r7:60000113 r6:eb029d8c r5:85293c00 r4:85293c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85293c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb029e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc5300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85293c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85262f8c r4:85262c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85262f8c r4:85097300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85293c00 r8:8509732c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85097300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097300 r8:80287e08 r7:eb009e60 r6:8514ae80 r5:85293c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb029fb0 to 0xeb029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc5180 INFO: task kworker/1:523:4574 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd60: 80230ad0 80239bb0 80050013 ffffffff r4:00000000 r5:85ef678c r4:85ef6400 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 INFO: task kworker/1:524:4576 blocked for more than 461 seconds. r4:85295400 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc5b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85295400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb055000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526878c r4:85268400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526878c r4:85097380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85295400 r8:850973ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85097380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097380 r8:80287e08 r7:eb009e60 r6:8514af00 r5:85295400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb031fb0 to 0xeb031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc5440 INFO: task kworker/1:524:4576 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c173a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:525 state:D stack:0 pid:4577 tgid:4577 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85296000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526378c r4:85263400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526378c r4:85097480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85296000 r8:850974ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85097480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097480 r8:80287e08 r7:eb031e60 r6:8514af80 r5:85296000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb035fb0 to 0xeb035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc5440 INFO: task kworker/1:525:4577 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c1d4d000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85293000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85263b8c r4:85263800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85263b8c r4:85097500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85293000 r8:8509752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85097500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097500 r8:80287e08 r7:eb031e60 r6:84b1f000 r5:85293000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb03dfb0 to 0xeb03dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc5540 INFO: task kworker/1:526:4579 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c1d4d000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04bdfb0 to 0xe04bdff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85296c00 r4:00000000 r4:00000000 r5:00001000 r4:eaf5f000 r5:85263f8c r4:85263c00 r7:ddde2d80 r6:83018200 r5:85263f8c r4:85097580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85296c00 r8:850975ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85097580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097580 r8:80287e08 r7:eb031e60 r6:84b1f080 r5:85296c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb045fb0 to 0xeb045ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc58c0 INFO: task kworker/1:527:4581 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c210f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e04bddc0 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb04dd84 r8:00000002 r7:60000013 r6:eb04dd8c r5:84828000 r4:84828000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84828000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc5980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84828000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526838c r4:85268000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526838c r4:85097600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84828000 r8:8509762c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85097600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097600 r8:80287e08 r7:eb031e60 r6:84b1f100 r5:84828000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb04dfb0 to 0xeb04dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc5940 INFO: task kworker/1:528:4583 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c210f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:202:4586 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:202 state:D stack:0 pid:4586 tgid:4586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb041d84 r8:00000002 r7:60000113 r6:eb041d8c r5:84828c00 r4:84828c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84828c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb041e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b402c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84828c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0635000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:851f2f8c r4:851f2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f2f8c r4:84b1f180 r10:61c88647 r9:84828c00 r8:84b1f1ac r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04bdd28 to 0xe04bdd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8482b000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc5b80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8482b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb05f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85268b8c r4:85268800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85268b8c r4:85097680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8482b000 r8:850976ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85097680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097680 r8:80287e08 r7:eb031e60 r6:84b1f200 r5:8482b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb06dfb0 to 0xeb06dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc5ac0 INFO: task kworker/1:529:4589 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c298f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:530:4591 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:530 state:D stack:0 pid:4591 tgid:4591 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb079d84 r8:00000002 r7:60000113 r6:eb079d8c r5:84829800 r4:84829800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84829800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb079e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc5d80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84829800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb065000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85268f8c r4:85268c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85268f8c r4:85097200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84829800 r8:8509722c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85097200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097200 r8:80287e08 r7:eb06de60 r6:84b1f280 r5:84829800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb079fb0 to 0xeb079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc5d40 INFO: task kworker/1:530:4591 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c298f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:531:4592 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:531 state:D stack:0 pid:4592 tgid:4592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:8482c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb07de08 r4:00000000 r5:8526938c r4:85269000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526938c r4:85097780 r10:61c88647 r9:8482c800 r8:850977ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04bdd28 to 0xe04bdd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:532:4595 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:532 state:D stack:0 pid:4595 tgid:4595 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb095d84 r8:00000002 r7:60000013 r6:eb095d8c r5:8482bc00 r4:8482bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8482bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb095e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc5f40 r9:83018205 r8:8482bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 r5:8526978c r4:85269400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8482bc00 r8:8509772c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb095fb0 to 0xeb095ff8) r4:84bc5e00 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85ef678c r4:85ef6400 r4:849ffe00 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:533:4596 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:533 state:D stack:0 pid:4596 tgid:4596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb099d84 r8:00000002 r7:60000113 r6:eb099d8c r5:8482e000 r4:8482e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8482e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472f040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8482e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb09b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85269b8c r4:85269800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85269b8c r4:85097800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8482e000 r8:8509782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85097800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097800 r8:80287e08 r7:eb095e60 r6:84b1f480 r5:8482e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb099fb0 to 0xeb099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc5e00 INFO: task kworker/1:533:4596 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c3142000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 r4:82ac21e4 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8482d400 r4:8291a680 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472f140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85269f8c r4:85269c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85269f8c r4:85097880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8482d400 r8:850978ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85097880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097880 r8:80287e08 r7:eb099e60 r6:84b1f500 r5:8482d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b1fb0 to 0xeb0b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472f240 INFO: task kworker/1:534:4599 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c3352000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:535 state:D stack:0 pid:4600 tgid:4600 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8526a38c r4:8526a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a38c r4:85097900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85298000 r8:8509792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85097900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097900 r8:80287e08 r7:eb0b1e60 r6:84b1f580 r5:85298000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0bdfb0 to 0xeb0bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472f240 INFO: task kworker/1:535:4600 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c3572000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:536:4602 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:536 state:D stack:0 pid:4602 tgid:4602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaff1d84 r8:00000002 r7:60000013 r6:eaff1d8c r5:85231800 r4:85231800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85231800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472f5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85231800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 r5:8526ab8c r4:8526a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526ab8c r4:85097980 r10:61c88647 r9:85231800 r8:850979ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeaff1fb0 to 0xeaff1ff8) r4:8472f2c0 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:537:4604 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:537 state:D stack:0 pid:4604 tgid:4604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf41d84 r8:00000002 r7:60000113 r6:eaf41d8c r5:85232400 r4:85232400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85232400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf41e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472f400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85232400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526a78c r4:8526a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526a78c r4:85097a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85232400 r8:85097aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85097a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097a80 r8:80287e08 r7:eaff1e60 r6:85097400 r5:85232400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf41fb0 to 0xeaf41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85ef678c r4:85ef6400 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:538 state:D stack:0 pid:4606 tgid:4606 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472f880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85233000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa0d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526b38c r4:8526b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526b38c r4:85097b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85233000 r8:85097b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85097b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097b00 r8:80287e08 r7:eaff1e60 r6:85097c00 r5:85233000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c1fb0 to 0xeb0c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472f580 INFO: task kworker/1:538:4606 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c3e1f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:539:4608 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:539 state:D stack:0 pid:4608 tgid:4608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0d5d84 r8:00000002 r7:60000013 r6:eb0d5d8c r5:85233c00 r4:85233c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472f700 r5:8526af8c r4:8526ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526af8c r4:85097c80 r10:61c88647 r9:85233c00 r8:85097cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c4124000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85234800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae61e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526b78c r4:8526b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85097b80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:541:4612 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:541 state:D stack:0 pid:4612 tgid:4612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0c9d84 r8:00000002 r7:60000013 r6:eb0c9d8c r5:85235400 r4:85235400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85235400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b16fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85235400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526c38c r4:8526c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85235400 r8:85097fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85097f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097f80 r8:80287e08 r7:eae61e60 r6:84167f00 r5:85235400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c9fb0 to 0xeb0c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472fc80 INFO: task kworker/1:541:4612 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c4561000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85ef678c r4:85ef6400 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85236c00 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8526bf8c r4:8526bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84787000 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04bdd28 to 0xe04bdd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:203:4616 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:203 state:D stack:0 pid:4616 tgid:4616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:851f338c r4:851f3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f338c r4:84b1f600 r10:61c88647 r9:8529a400 r8:84b1f62c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:543:4620 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:543 state:D stack:0 pid:4620 tgid:4620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0f5d84 r8:00000002 r7:60000113 r6:eb0f5d8c r5:85299800 r4:85299800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85299800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2b000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85299800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 r5:8526cb8c r4:8526c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526cb8c r4:84787100 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 task:kworker/1:544 state:D stack:0 pid:4621 tgid:4621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0f9d84 r8:00000002 r7:60000113 r6:eb0f9d8c r5:8529c800 r4:8529c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472fdc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8529c800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0873000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526c78c r4:8526c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526c78c r4:84787180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8529c800 r8:847871ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787180 r8:80287e08 r7:eb0f5e60 r6:84b1f700 r5:8529c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f9fb0 to 0xeb0f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85131680 INFO: task kworker/1:544:4621 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c4e4c000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:545:4623 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:545 state:D stack:0 pid:4623 tgid:4623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb101d84 r8:00000002 r7:60000013 r6:eb101d8c r5:85298c00 r4:85298c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85298c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb101e08 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r9:83018205 r8:85298c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:8526cf8c r4:8526cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526cf8c r4:84787200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85298c00 r8:8478722c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787200 r8:80287e08 r7:eb0f5e60 r6:84b1f800 r5:85298c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb101fb0 to 0xeb101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2b100 INFO: task kworker/1:545:4623 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c4e4c000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:546:4625 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:546 state:D stack:0 pid:4625 tgid:4625 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb109d84 r8:00000002 r7:60000013 r6:eb109d8c r5:8529e000 r4:8529e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb109e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2b480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8529e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526d78c r4:8526d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526d78c r4:84787380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8529e000 r8:847873ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787380 r8:80287e08 r7:eb101e60 r6:84b1f880 r5:8529e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb109fb0 to 0xeb109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2b140 INFO: task kworker/1:546:4625 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c5502000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:547:4626 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:547 state:D stack:0 pid:4626 tgid:4626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb10dd84 r8:00000002 r7:60000113 r6:eb10dd8c r5:8529ec00 r4:8529ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2b300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8529ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9eb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8526d38c r4:8526d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526d38c r4:84787400 r10:61c88647 r9:8529ec00 r8:8478742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c5502000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:548:4628 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:548 state:D stack:0 pid:4628 tgid:4628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb115d84 r8:00000002 r7:60000113 r6:eb115d8c r5:8529bc00 r4:8529bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb115e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2b740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8529bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526df8c r4:8526dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526df8c r4:84787480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8529bc00 r8:847874ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787480 r8:80287e08 r7:eb109e60 r6:84b1f980 r5:8529bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb115fb0 to 0xeb115ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2b2c0 INFO: task kworker/1:548:4628 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c58f9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:549:4630 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:549 state:D stack:0 pid:4630 tgid:4630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb11dd84 r8:00000002 r7:60000113 r6:eb11dd8c r5:8529b000 r4:8529b000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2b500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8529b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526db8c r4:8526d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526db8c r4:84787300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8529b000 r8:8478732c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787300 r8:80287e08 r7:eb115e60 r6:84b1fa00 r5:8529b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb11dfb0 to 0xeb11dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2b440 INFO: task kworker/1:549:4630 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c58f9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:550:4632 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:550 state:D stack:0 pid:4632 tgid:4632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb125d84 r8:00000002 r7:60000113 r6:eb125d8c r5:8482a400 r4:8482a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8482a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb125e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2b9c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8482a400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526e78c r4:8526e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526e78c r4:84787280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8482a400 r8:847872ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787280 r8:80287e08 r7:eb115e60 r6:84b1fa80 r5:8482a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb125fb0 to 0xeb125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2b600 INFO: task kworker/1:550:4632 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c5cc2000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:551:4634 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:551 state:D stack:0 pid:4634 tgid:4634 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb129d84 r8:00000002 r7:60000013 r6:eb129d8c r5:8482ec00 r4:8482ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8482ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb129e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2b840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab5f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526e38c r4:8526e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526e38c r4:84787600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8482ec00 r8:8478762c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787600 r8:80287e08 r7:eb125e60 r6:84b1fb00 r5:8482ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb129fb0 to 0xeb129ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2b780 INFO: task kworker/1:551:4634 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c60d9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:552:4637 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:552 state:D stack:0 pid:4637 tgid:4637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb121d84 r8:00000002 r7:60000013 r6:eb121d8c r5:8529d400 r4:8529d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb121e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526ef8c r4:8526ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526ef8c r4:84787680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8529d400 r8:847876ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787680 r8:80287e08 r7:eb125e60 r6:84b1fb80 r5:8529d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb121fb0 to 0xeb121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2bac0 INFO: task kworker/1:552:4637 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c6547000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:204:4639 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:204 state:D stack:0 pid:4639 tgid:4639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb131d84 r8:00000002 r7:60000113 r6:eb131d8c r5:85238c00 r4:85238c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85238c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb131e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336d80 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8478db8c r4:8478d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85238c00 r8:84b1fd2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb131fb0 to 0xeb131ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b408c0 INFO: task kworker/0:204:4639 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c6547000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:553:4640 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:553 state:D stack:0 pid:4640 tgid:4640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb135d84 r8:00000002 r7:60000013 r6:eb135d8c r5:85239800 r4:85239800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85239800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2bb00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85239800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526eb8c r4:8526e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526eb8c r4:84787700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85239800 r8:8478772c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787700 r8:80287e08 r7:eb121e60 r6:84b1fc80 r5:85239800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb135fb0 to 0xeb135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2b980 INFO: task kworker/1:553:4640 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:00000000 r5:00001000 r4:ed727000 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 task:kworker/1:554 state:D stack:0 pid:4641 tgid:4641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb139d84 r8:00000002 r7:60000113 r6:eb139d8c r5:8523a400 r4:8523a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8523a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb139e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2bf00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8523a400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526f78c r4:8526f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526f78c r4:84787500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523a400 r8:8478752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787500 r8:80287e08 r7:eb121e60 r6:84b1fd80 r5:8523a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb139fb0 to 0xeb139ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2ba40 INFO: task kworker/1:554:4641 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c6908000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:555:4644 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:555 state:D stack:0 pid:4644 tgid:4644 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb12dd84 r8:00000002 r7:60000113 r6:eb12dd8c r5:85230c00 r4:85230c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85230c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2bd40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85230c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead3f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526f38c r4:8526f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526f38c r4:84787800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85230c00 r8:8478782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787800 r8:80287e08 r7:eb139e60 r6:84787780 r5:85230c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb12dfb0 to 0xeb12dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2bc80 INFO: task kworker/1:555:4644 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c6d51000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:556:4647 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:556 state:D stack:0 pid:4647 tgid:4647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb141d84 r8:00000002 r7:60000113 r6:eb141d8c r5:85236000 r4:85236000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85236000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb141e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b40340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85236000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526fb8c r4:8526f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526fb8c r4:84787880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85236000 r8:847878ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787880 r8:80287e08 r7:eb139e60 r6:84787980 r5:85236000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb141fb0 to 0xeb141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2bc00 INFO: task kworker/1:556:4647 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c74ba000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:557:4649 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:557 state:D stack:0 pid:4649 tgid:4649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb145d84 r8:00000002 r7:60000013 r6:eb145d8c r5:847bec00 r4:847bec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847bec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472fe00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526ff8c r4:8526fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526ff8c r4:84787580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847bec00 r8:847875ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787580 r8:80287e08 r7:eb141e60 r6:84787a80 r5:847bec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb145fb0 to 0xeb145ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c74ba000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:558:4651 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:558 state:D stack:0 pid:4651 tgid:4651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb149d84 r8:00000002 r7:60000113 r6:eb149d8c r5:852f0000 r4:852f0000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f0000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339240 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae97000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527078c r4:85270400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527078c r4:84787900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f0000 r8:8478792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787900 r8:80287e08 r7:eb145e60 r6:84787b00 r5:852f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb149fb0 to 0xeb149ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85339100 INFO: task kworker/1:558:4651 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c74ba000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:559 state:D stack:0 pid:4652 tgid:4652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae85d84 r8:00000002 r7:60000113 r6:eae85d8c r5:852f0c00 r4:852f0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae85e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae75000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527038c r4:85270000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527038c r4:84787b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f0c00 r8:84787bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787b80 r8:80287e08 r7:eb149e60 r6:84787a00 r5:852f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae85fb0 to 0xeae85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85339100 INFO: task kworker/1:559:4652 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c74ba000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:560:4655 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:560 state:D stack:0 pid:4655 tgid:4655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb14dd84 r8:00000002 r7:60000013 r6:eb14dd8c r5:852f1800 r4:852f1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb14de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85270b8c r4:85270800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85270b8c r4:84787c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f1800 r8:84787c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787c00 r8:80287e08 r7:eb149e60 r6:84787d80 r5:852f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb14dfb0 to 0xeb14dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85339200 INFO: task kworker/1:560:4655 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c7c5b000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:561:4657 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:561 state:D stack:0 pid:4657 tgid:4657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb155d84 r8:00000002 r7:60000013 r6:eb155d8c r5:852f2400 r4:852f2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527138c r4:85271000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527138c r4:84787c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f2400 r8:84787cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787c80 r8:80287e08 r7:eb14de60 r6:84787e80 r5:852f2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb155fb0 to 0xeb155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853393c0 INFO: task kworker/1:561:4657 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd20: c7c5b000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:562:4659 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:562 state:D stack:0 pid:4659 tgid:4659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb159d84 r8:00000002 r7:60000113 r6:eb159d8c r5:852f3000 r4:852f3000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f3000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb159e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeaf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85270f8c r4:85270c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85270f8c r4:84787d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f3000 r8:84787d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84787d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787d00 r8:80287e08 r7:eb155e60 r6:84787f80 r5:852f3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb159fb0 to 0xeb159ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85339640 INFO: task kworker/1:562:4659 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c7d39000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:563:4661 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:563 state:D stack:0 pid:4661 tgid:4661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb151d84 r8:00000002 r7:60000113 r6:eb151d8c r5:852f4800 r4:852f4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb151e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853398c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527178c r4:85271400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527178c r4:8533f080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f4800 r8:8533f0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8533f080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533f080 r8:80287e08 r7:eb155e60 r6:8533f000 r5:852f4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb151fb0 to 0xeb151ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853396c0 INFO: task kworker/1:563:4661 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c8189000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r4:82ac21e4 r4:e04bddc0 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:564:4663 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:564 state:D stack:0 pid:4663 tgid:4663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb15dd84 r8:00000002 r7:60000113 r6:eb15dd8c r5:852f6000 r4:852f6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb161000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85271b8c r4:85271800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85271b8c r4:8533f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f6000 r8:8533f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8533f100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533f100 r8:80287e08 r7:eb151e60 r6:8533f200 r5:852f6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb15dfb0 to 0xeb15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85339880 INFO: task kworker/1:564:4663 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c84a9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:565:4665 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:565 state:D stack:0 pid:4665 tgid:4665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb16dd84 r8:00000002 r7:60000113 r6:eb16dd8c r5:852f3c00 r4:852f3c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f3c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb175000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527238c r4:85272000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527238c r4:8533f280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f3c00 r8:8533f2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8533f280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533f280 r8:80287e08 r7:eb15de60 r6:8533f180 r5:852f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb16dfb0 to 0xeb16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85339a00 INFO: task kworker/1:565:4665 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c8957000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:566:4666 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:566 state:D stack:0 pid:4666 tgid:4666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb179d84 r8:00000002 r7:60000113 r6:eb179d8c r5:852f8000 r4:852f8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb179e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb16f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85271f8c r4:85271c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85271f8c r4:8533f300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f8000 r8:8533f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8533f300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533f300 r8:80287e08 r7:eb16de60 r6:8533f480 r5:852f8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb179fb0 to 0xeb179ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85339c80 INFO: task kworker/1:566:4666 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c8c32000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:567:4669 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:567 state:D stack:0 pid:4669 tgid:4669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb169d84 r8:00000002 r7:60000113 r6:eb169d8c r5:852f8c00 r4:852f8c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f8c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb169e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85344040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb183000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527278c r4:8533f380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f8c00 r8:8533f3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8533f380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533f380 r8:80287e08 r7:eb16de60 r6:8533f580 r5:852f8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb169fb0 to 0xeb169ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85339e80 INFO: task kworker/1:567:4669 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c8d4b000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:568:4671 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:568 state:D stack:0 pid:4671 tgid:4671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb191d84 r8:00000002 r7:60000013 r6:eb191d8c r5:8523bc00 r4:8523bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8523bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb191e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85344180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb189000 r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85272b8c r4:8533f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523bc00 r8:8533f42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85344080 Workqueue: events bpf_prog_free_deferred r4:00000000 dd20: c8fbe000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:82ac21e4 r4:e04bddc0 r4:00000000 r5:00001000 r4:ed727000 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:569 state:D stack:0 pid:4673 tgid:4673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb19dd84 r8:00000002 r7:60000113 r6:eb19dd8c r5:8523e000 r4:8523e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8523e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb19de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85344380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8523e000 r7:00000000 r6:83018200 r5:00001000 r4:7f011000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527338c r4:85273000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527338c r4:8533f680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523e000 r8:8533f6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8533f680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533f680 r8:80287e08 r7:eb191e60 r6:84b1fe80 r5:8523e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb19dfb0 to 0xeb19dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85344280 INFO: task kworker/1:569:4673 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c9199000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:205:4677 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:205 state:D stack:0 pid:4677 tgid:4677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafadd84 r8:00000002 r7:60000113 r6:eafadd8c r5:8523c800 r4:8523c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8523c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafade08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336b40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8523c800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0709000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f3b8c r4:851f3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f3b8c r4:84b1ff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523c800 r8:84b1ff2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b1ff00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b1ff00 r8:80287e08 r7:eb131e60 r6:84b1ff80 r5:8523c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafadfb0 to 0xeafadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85336a80 INFO: task kworker/0:205:4677 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c9437000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:206:4679 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:206 state:D stack:0 pid:4679 tgid:4679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb181d84 r8:00000002 r7:60000113 r6:eb181d8c r5:8523ec00 r4:8523ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8523ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8523ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0777000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f3f8c r4:851f3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f3f8c r4:85097d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523ec00 r8:85097d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85097d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85097d00 r8:80287e08 r7:eb131e60 r6:85097f00 r5:8523ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb181fb0 to 0xeb181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85336e40 INFO: task kworker/0:206:4679 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c96e4000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:4680 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:4680 tgid:4680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafe9d84 r8:00000002 r7:60000013 r6:eafe9d8c r5:8523d400 r4:8523d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8523d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514f740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8523d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffdf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8478df8c r4:8478dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8478df8c r4:8533f700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523d400 r8:8533f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8533f700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533f700 r8:80287e08 r7:eb19de60 r6:8533f600 r5:8523d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe9fb0 to 0xeafe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853443c0 INFO: task kworker/1:570:4680 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c9964000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:571:4681 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:571 state:D stack:0 pid:4681 tgid:4681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb011d84 r8:00000002 r7:60000113 r6:eb011d8c r5:852f9800 r4:852f9800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f9800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb011e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2ab80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527378c r4:85273400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527378c r4:8533f780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f9800 r8:8533f7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8533f780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533f780 r8:80287e08 r7:eafe9e60 r6:8533f500 r5:852f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb011fb0 to 0xeb011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853443c0 INFO: task kworker/1:571:4681 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c9c27000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:207:4684 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:207 state:D stack:0 pid:4684 tgid:4684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb059d84 r8:00000002 r7:60000113 r6:eb059d8c r5:852fb000 r4:852fb000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852fb000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853367c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8478d78c r4:8478d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8478d78c r4:8534e080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852fb000 r8:8534e0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534e080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e080 r8:80287e08 r7:eb131e60 r6:8533f800 r5:852fb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb059fb0 to 0xeb059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85336dc0 INFO: task kworker/0:207:4684 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c9c27000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:208:4686 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:208 state:D stack:0 pid:4686 tgid:4686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb069d84 r8:00000002 r7:60000113 r6:eb069d8c r5:852fc800 r4:852fc800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852fc800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533d340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac8d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852c138c r4:852c1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c138c r4:8534e100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852fc800 r8:8534e12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534e100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e100 r8:80287e08 r7:eb059e60 r6:8533f880 r5:852fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb069fb0 to 0xeb069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85336dc0 INFO: task kworker/0:208:4686 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: c9f3b000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:209:4687 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:209 state:D stack:0 pid:4687 tgid:4687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb071d84 r8:00000002 r7:60000013 r6:eb071d8c r5:852fd400 r4:852fd400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852fd400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb071e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852c038c r4:852c0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c038c r4:8534e200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852fd400 r8:8534e22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534e200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e200 r8:80287e08 r7:eb069e60 r6:8533f900 r5:852fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb071fb0 to 0xeb071ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85336dc0 INFO: task kworker/0:209:4687 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ca29a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:210:4690 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:210 state:D stack:0 pid:4690 tgid:4690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb18dd84 r8:00000002 r7:60000013 r6:eb18dd8c r5:8523b000 r4:8523b000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8523b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb18de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84749140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8523b000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852c078c r4:852c0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c078c r4:8534e280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523b000 r8:8534e2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534e280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e280 r8:80287e08 r7:eb069e60 r6:8534e300 r5:8523b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb18dfb0 to 0xeb18dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853364c0 INFO: task kworker/0:210:4690 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ca54a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:211:4692 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:211 state:D stack:0 pid:4692 tgid:4692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb089d84 r8:00000002 r7:60000013 r6:eb089d8c r5:85238000 r4:85238000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85238000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb089e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852c0b8c r4:852c0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85238000 r8:8534e1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534e180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e180 r8:80287e08 r7:eb069e60 r6:8534e380 r5:85238000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb089fb0 to 0xeb089ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533d240 INFO: task kworker/0:211:4692 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ca931000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:212:4693 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:212 state:D stack:0 pid:4693 tgid:4693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb021d84 r8:00000002 r7:60000113 r6:eb021d8c r5:852b0000 r4:852b0000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852b0000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb021e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533d140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852c0f8c r4:852c0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c0f8c r4:8534e400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b0000 r8:8534e42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8534e400 r8:80287e08 r7:eb069e60 r6:8534e000 r5:852b0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb021fb0 to 0xeb021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533d240 INFO: task kworker/0:212:4693 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ca931000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:213:4695 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:213 state:D stack:0 pid:4695 tgid:4695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0a5d84 r8:00000002 r7:60000113 r6:eb0a5d8c r5:852b0c00 r4:852b0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852b0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533d500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacbf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852c178c r4:852c1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c178c r4:8534e480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b0c00 r8:8534e4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534e480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e480 r8:80287e08 r7:eb069e60 r6:8534e600 r5:852b0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a5fb0 to 0xeb0a5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd20: cac34000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:82ac21e4 r4:e04bddc0 r4:00000000 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:214:4698 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:214 state:D stack:0 pid:4698 tgid:4698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1a1d84 r8:00000002 r7:60000113 r6:eb1a1d8c r5:852b1800 r4:852b1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852b1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533d640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852c1b8c r4:852c1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c1b8c r4:8534e500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b1800 r8:8534e52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534e500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e500 r8:80287e08 r7:eb0a5e60 r6:8534e700 r5:852b1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a1fb0 to 0xeb1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533d4c0 INFO: task kworker/0:214:4698 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cadf2000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:215:4701 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:215 state:D stack:0 pid:4701 tgid:4701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1a5d84 r8:00000002 r7:60000113 r6:eb1a5d8c r5:852b2400 r4:852b2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852b2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533da80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852c278c r4:852c2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c278c r4:8534e580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b2400 r8:8534e5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534e580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e580 r8:80287e08 r7:eb1a1e60 r6:8534e780 r5:852b2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a5fb0 to 0xeb1a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533d580 INFO: task kworker/0:215:4701 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cafef000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:216:4702 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:216 state:D stack:0 pid:4702 tgid:4702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0a9d84 r8:00000002 r7:60000113 r6:eb0a9d8c r5:852b3000 r4:852b3000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852b3000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533d780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadeb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852c1f8c r4:852c1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c1f8c r4:8534e800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b3000 r8:8534e82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534e800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e800 r8:80287e08 r7:eb1a5e60 r6:8534e680 r5:852b3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a9fb0 to 0xeb0a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533d580 INFO: task kworker/0:216:4702 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cb2d5000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:4703 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:217 state:D stack:0 pid:4703 tgid:4703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1a9d84 r8:00000002 r7:60000013 r6:eb1a9d8c r5:852b3c00 r4:852b3c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852b3c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533da00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r5:852c238c r4:852c2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c238c r4:8534e880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b3c00 r8:8534e8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534e880 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 r4:8533d580 Workqueue: events bpf_prog_free_deferred [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe04bdd28 to 0xe04bdd70) dd60: 80230ad0 80239bb0 80050013 ffffffff r4:82ac21e4 r4:e04bddc0 r4:00000000 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:218:4706 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:218 state:D stack:0 pid:4706 tgid:4706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1b1d84 r8:00000002 r7:60000013 r6:eb1b1d8c r5:852b5400 r4:852b5400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852b5400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533dcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852c2b8c r4:852c2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c2b8c r4:8534e980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b5400 r8:8534e9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534e980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e980 r8:80287e08 r7:eb1a5e60 r6:8534ea80 r5:852b5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b1fb0 to 0xeb1b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533dac0 INFO: task kworker/0:218:4706 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cb814000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:219:4708 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:219 state:D stack:0 pid:4708 tgid:4708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:eb1add84 r8:00000002 r7:60000113 r6:eb1add8c r5:852b6000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:852b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae39000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852c2f8c r4:852c2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c2f8c r4:8534eb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b6000 r8:8534eb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534eb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534eb00 r8:80287e08 r7:eb1b1e60 r6:8534eb80 r5:852b6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1adfb0 to 0xeb1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533dc80 INFO: task kworker/0:219:4708 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cba43000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:220:4711 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:220 state:D stack:0 pid:4711 tgid:4711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1b9d84 r8:00000002 r7:60000113 r6:eb1b9d8c r5:852b6c00 r4:852b6c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852b6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533df40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae55000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852c338c r4:852c3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c338c r4:8534ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b6c00 r8:8534ec2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534ec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534ec00 r8:80287e08 r7:eb1ade60 r6:8534ed00 r5:852b6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b9fb0 to 0xeb1b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533dd80 INFO: task kworker/0:220:4711 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cbcf8000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:221:4712 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:221 state:D stack:0 pid:4712 tgid:4712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1c9d84 r8:00000002 r7:60000013 r6:eb1c9d8c r5:852fa400 r4:852fa400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852fa400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532c040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852c378c r4:852c3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c378c r4:8534ea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852fa400 r8:8534ea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534ea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534ea00 r8:80287e08 r7:eb1b9e60 r6:8533f980 r5:852fa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c9fb0 to 0xeb1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533dd80 INFO: task kworker/0:221:4712 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cbd60000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:222:4715 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:222 state:D stack:0 pid:4715 tgid:4715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1d1d84 r8:00000002 r7:60000113 r6:eb1d1d8c r5:852f5400 r4:852f5400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f5400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532c180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf51000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852c3b8c r4:852c3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c3b8c r4:8534ec80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f5400 r8:8534ecac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534ec80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534ec80 r8:80287e08 r7:eb1c9e60 r6:8533fa00 r5:852f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d1fb0 to 0xeb1d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8532c000 INFO: task kworker/0:222:4715 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cc237000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:223:4717 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:223 state:D stack:0 pid:4717 tgid:4717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1d9d84 r8:00000002 r7:60000013 r6:eb1d9d8c r5:852fe000 r4:852fe000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852fe000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532c2c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:852c3f8c r4:852c3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:852fe000 r8:8534ee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534ee00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534ee00 r8:80287e08 r7:eb1d1e60 r6:8533fa80 r5:852fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d9fb0 to 0xeb1d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8532c0c0 INFO: task kworker/0:223:4717 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cc237000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:224:4718 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:224 state:D stack:0 pid:4718 tgid:4718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1ddd84 r8:00000002 r7:60000113 r6:eb1ddd8c r5:852fec00 r4:852fec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852fec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1dde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532c480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852cc38c r4:852cc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852cc38c r4:8534ef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852fec00 r8:8534ef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534ef00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534ef00 r8:80287e08 r7:eb1d9e60 r6:8533fb00 r5:852fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1ddfb0 to 0xeb1ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8532c0c0 INFO: task kworker/0:224:4718 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd20: cc237000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:82ac21e4 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:225:4719 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:225 state:D stack:0 pid:4719 tgid:4719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1e1d84 r8:00000002 r7:60000113 r6:eb1e1d8c r5:852fbc00 r4:852fbc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852fbc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532c800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ccf8c r4:852ccc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ccf8c r4:8534ee80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852fbc00 r8:8534eeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534ee80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534ee80 r8:80287e08 r7:eb1dde60 r6:8533fb80 r5:852fbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e1fb0 to 0xeb1e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8532c0c0 INFO: task kworker/0:225:4719 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cc4b4000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:226:4721 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:226 state:D stack:0 pid:4721 tgid:4721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1e9d84 r8:00000002 r7:60000113 r6:eb1e9d8c r5:85300c00 r4:85300c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85300c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532c500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85300c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf95000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852cc78c r4:852cc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852cc78c r4:84b41000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85300c00 r8:84b4102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41000 r8:80287e08 r7:eb1e1e60 r6:8533fc00 r5:85300c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e9fb0 to 0xeb1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8532c440 INFO: task kworker/0:226:4721 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cc6c1000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:227:4724 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:227 state:D stack:0 pid:4724 tgid:4724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1f5d84 r8:00000002 r7:60000113 r6:eb1f5d8c r5:85300000 r4:85300000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85300000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532c6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85300000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ccb8c r4:852cc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ccb8c r4:84b41080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85300000 r8:84b410ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41080 r8:80287e08 r7:eb1e1e60 r6:8533fc80 r5:85300000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f5fb0 to 0xeb1f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8532c540 INFO: task kworker/0:227:4724 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cc96f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r4:85301800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85301800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532c940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85301800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852cd38c r4:852cd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852cd38c r4:84b41180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85301800 r8:84b411ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41180 r8:80287e08 r7:eb1e1e60 r6:8533fd00 r5:85301800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f9fb0 to 0xeb1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8532c900 INFO: task kworker/0:228:4725 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ccbaf000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:229:4728 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:229 state:D stack:0 pid:4728 tgid:4728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb205d84 r8:00000002 r7:60000113 r6:eb205d8c r5:85302400 r4:85302400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85302400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb205e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532cb80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852cdb8c r4:852cd800 r7:dddced80 r6:83018000 r5:852cdb8c r4:84b41280 r4:84b41280 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8532c740 Workqueue: events bpf_prog_free_deferred [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:230:4730 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:230 state:D stack:0 pid:4730 tgid:4730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb20dd84 r8:00000002 r7:60000113 r6:eb20dd8c r5:85304800 r4:85304800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85304800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb20de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532c880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85304800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852cd78c r4:852cd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852cd78c r4:84b41300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85304800 r8:84b4132c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41300 r8:80287e08 r7:eb205e60 r6:8533fe00 r5:85304800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb20dfb0 to 0xeb20dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8532cc80 INFO: task kworker/0:230:4730 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ccf54000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 Call trace: [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb215e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532ce80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85303c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb049000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ce38c r4:852ce000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ce38c r4:84b41100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85303c00 r8:84b4112c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41100 r8:80287e08 r7:eb205e60 r6:8533fe80 r5:85303c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb215fb0 to 0xeb215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8532c740 INFO: task kworker/0:231:4732 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cd524000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:4734 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:232 state:D stack:0 pid:4734 tgid:4734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb21dd84 r8:00000002 r7:60000113 r6:eb21dd8c r5:85306000 r4:85306000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85306000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb21de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532cd00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85306000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb037000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852cdf8c r4:852cdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852cdf8c r4:84b41380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85306000 r8:84b413ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41380 r8:80287e08 r7:eb215e60 r6:8533ff00 r5:85306000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb21dfb0 to 0xeb21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8532cac0 INFO: task kworker/0:232:4734 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cd5f1000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:233:4736 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:233 state:D stack:0 pid:4736 tgid:4736 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb225d84 r8:00000002 r7:60000113 r6:eb225d8c r5:85305400 r4:85305400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85305400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb225e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f2c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85305400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb061000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ce78c r4:852ce400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ce78c r4:84b41480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85305400 r8:84b414ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41480 r8:80287e08 r7:eb215e60 r6:8533ff80 r5:85305400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb225fb0 to 0xeb225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8532ccc0 INFO: task kworker/0:233:4736 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cd82a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:234:4739 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:234 state:D stack:0 pid:4739 tgid:4739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb231d84 r8:00000002 r7:60000113 r6:eb231d8c r5:85306c00 r4:85306c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85306c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb231e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532cf00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85306c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb08f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852cef8c r4:852cec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852cef8c r4:84b41500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85306c00 r8:84b4152c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41500 r8:80287e08 r7:eb225e60 r6:84787e00 r5:85306c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb231fb0 to 0xeb231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85344480 INFO: task kworker/0:234:4739 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd20: cdbc7000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:00000000 r5:00001000 r4:ed727000 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:235:4740 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:235 state:D stack:0 pid:4740 tgid:4740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb235d84 r8:00000002 r7:60000113 r6:eb235d8c r5:85308000 r4:85308000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85308000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb235e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85344fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85308000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb075000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ceb8c r4:852ce800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ceb8c r4:84b41400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85308000 r8:84b4142c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41400 r8:80287e08 r7:eb231e60 r6:84787f00 r5:85308000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb235fb0 to 0xeb235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85344480 INFO: task kworker/0:235:4740 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cdbc7000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb23de08 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d038c r4:852d0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d038c r4:84b41580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85309800 r8:84b415ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41580 r8:80287e08 r7:eb231e60 r6:8514b000 r5:85309800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb23dfb0 to 0xeb23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bc5f80 INFO: task kworker/0:236:4742 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cdfb6000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:4743 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:4743 tgid:4743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb241d84 r8:00000002 r7:60000113 r6:eb241d8c r5:8530a400 r4:8530a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8530a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb241e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84843040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb09f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852cf38c r4:852cf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852cf38c r4:84b41680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530a400 r8:84b416ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41680 r8:80287e08 r7:eb23de60 r6:8514b080 r5:8530a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb241fb0 to 0xeb241ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84843100 INFO: task kworker/0:237:4743 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ce543000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:238:4745 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:238 state:D stack:0 pid:4745 tgid:4745 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb249d84 r8:00000002 r7:60000013 r6:eb249d8c r5:85308c00 r4:85308c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85308c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb249e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848431c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85308c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852cf78c r4:852cf400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852cf78c r4:84b41700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85308c00 r8:84b4172c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41700 r8:80287e08 r7:eb23de60 r6:8514b100 r5:85308c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb249fb0 to 0xeb249ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84843000 INFO: task kworker/0:238:4745 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ce543000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e04bddc0 r4:00000000 r5:00001000 r4:ed727000 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:8530bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8530bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb24de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848433c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852cfb8c r4:852cf800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852cfb8c r4:84b41200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530bc00 r8:84b4122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41200 r8:80287e08 r7:eb23de60 r6:8514b180 r5:8530bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb24dfb0 to 0xeb24dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84843180 INFO: task kworker/0:239:4747 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ce543000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:240:4750 blocked for more than 463 seconds. Workqueue: events bpf_prog_free_deferred [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:8530c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 r5:852cff8c r4:852cfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8530c800 r8:84b4182c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41800 r8:80287e08 r7:eb23de60 r6:8514b200 r5:8530c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c5fb0 to 0xeb1c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84843180 INFO: task kworker/0:240:4750 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cebc1000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:572:4753 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:572 state:D stack:0 pid:4753 tgid:4753 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514f6c0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85273f8c r4:85273c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85273f8c r4:8514b380 r10:61c88647 r9:8530ec00 r8:8514b3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd20: cebc1000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:241:4754 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:241 state:D stack:0 pid:4754 tgid:4754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb26dd84 r8:00000002 r7:60000113 r6:eb26dd8c r5:8530d400 r4:8530d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8530d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb26de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85334040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530d400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e073d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d1f8c r4:852d1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d1f8c r4:84b41880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530d400 r8:84b418ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41880 r8:80287e08 r7:eb23de60 r6:8514b300 r5:8530d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb26dfb0 to 0xeb26dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848435c0 INFO: task kworker/0:241:4754 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cf199000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:4755 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:4755 tgid:4755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb271d84 r8:00000002 r7:60000013 r6:eb271d8c r5:8530b000 r4:8530b000 r5:8530b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb271e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84843740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb261000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d078c r4:852d0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d078c r4:84b41780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530b000 r8:84b417ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41780 r8:80287e08 r7:eb26de60 r6:8514b400 r5:8530b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb271fb0 to 0xeb271ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848435c0 INFO: task kworker/0:242:4755 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cf556000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84843880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84958000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d0b8c r4:852d0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d0b8c r4:84b41900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84958000 r8:84b4192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41900 r8:80287e08 r7:eb26de60 r6:84b41980 r5:84958000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb245fb0 to 0xeb245ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84843680 INFO: task kworker/0:243:4757 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cf556000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:244:4761 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:244 state:D stack:0 pid:4761 tgid:4761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0e5d84 r8:00000002 r7:60000113 r6:eb0e5d8c r5:84959800 r4:84959800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84959800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841abc80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84959800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r5:00001000 r4:eb2af000 r5:852d0f8c r4:852d0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84959800 r8:84b41a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e5fb0 to 0xeb0e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848437c0 INFO: task kworker/0:244:4761 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cf556000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:573:4763 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:573 state:D stack:0 pid:4763 tgid:4763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2a1d84 r8:00000002 r7:60000113 r6:eb2a1d8c r5:8495bc00 r4:8495bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8495bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514ffc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8495bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab0d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537978c r4:85379400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8537978c r4:8514b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8495bc00 r8:8514b4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b480 r8:80287e08 r7:eafe9e60 r6:84b41a80 r5:8495bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a1fb0 to 0xeb2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd20: cf8ba000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:82ac21e4 r4:e04bddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:574:4764 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:574 state:D stack:0 pid:4764 tgid:4764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2a5d84 r8:00000002 r7:60000113 r6:eb2a5d8c r5:8495c800 r4:8495c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8495c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514f980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8495c800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537838c r4:85378000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8537838c r4:8514b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8495c800 r8:8514b52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b500 r8:80287e08 r7:eb2a1e60 r6:84b41b00 r5:8495c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a5fb0 to 0xeb2a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8514f780 INFO: task kworker/1:574:4764 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cfbc2000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:575:4766 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:575 state:D stack:0 pid:4766 tgid:4766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2add84 r8:00000002 r7:60000113 r6:eb2add8c r5:8495b000 r4:8495b000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8495b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ade08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514fa40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8495b000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537878c r4:85378400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8537878c r4:8514b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8495b000 r8:8514b5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b580 r8:80287e08 r7:eb2a1e60 r6:84b41b80 r5:8495b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2adfb0 to 0xeb2adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8514fb40 INFO: task kworker/1:575:4766 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: cff1b000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:576:4768 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:576 state:D stack:0 pid:4768 tgid:4768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2bdd84 r8:00000002 r7:60000013 r6:eb2bdd8c r5:8495a400 r4:8495a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8495a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2bde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514fc00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8495a400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0863000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85378b8c r4:85378800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85378b8c r4:8514b680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8495a400 r8:8514b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b680 r8:80287e08 r7:eb2a1e60 r6:84b41c00 r5:8495a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2bdfb0 to 0xeb2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8514fb80 INFO: task kworker/1:576:4768 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d0270000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:577:4770 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:8530e000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 r5:85378f8c r4:85378c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85378f8c r4:8514b700 r10:61c88647 r9:8530e000 r8:8514b72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b700 r8:80287e08 r7:eb2a1e60 r6:8514b780 r5:8530e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb289fb0 to 0xeb289ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8514fac0 INFO: task kworker/1:577:4770 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d02a1000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:578:4773 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:578 state:D stack:0 pid:4773 tgid:4773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2c5d84 r8:00000002 r7:60000113 r6:eb2c5d8c r5:852f6c00 r4:852f6c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514fe80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537938c r4:85379000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8537938c r4:8514b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f6c00 r8:8514b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b800 r8:80287e08 r7:eb2a1e60 r6:8514b900 r5:852f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8514fcc0 INFO: task kworker/1:578:4773 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd20: d05f4000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:579:4776 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:579 state:D stack:0 pid:4776 tgid:4776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2c9d84 r8:00000002 r7:60000113 r6:eb2c9d8c r5:85303000 r4:85303000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85303000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2a680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85303000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab61000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85379f8c r4:85379c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85379f8c r4:8514b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85303000 r8:8514b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b600 r8:80287e08 r7:eb2a1e60 r6:8514b980 r5:85303000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c9fb0 to 0xeb2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84749040 INFO: task kworker/1:579:4776 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d08d7000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:580:4777 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:580 state:D stack:0 pid:4777 tgid:4777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2cdd84 r8:00000002 r7:60000013 r6:eb2cdd8c r5:85310000 r4:85310000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85310000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2cde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84749180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85310000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85379b8c r4:85379800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85379b8c r4:8514ba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85310000 r8:8514ba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514ba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514ba00 r8:80287e08 r7:eb2c9e60 r6:8514bb00 r5:85310000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2cdfb0 to 0xeb2cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2a4c0 INFO: task kworker/1:580:4777 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d0c15000 dfdc7000 00000001 80239b98 7f561000 00000001 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:581:4779 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:581 state:D stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2d5d84 r8:00000002 r7:60000113 r6:eb2d5d8c r5:85310c00 r4:85310c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85310c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8c040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85310c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac75000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537a38c r4:8537a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8537a38c r4:8514b880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85310c00 r8:8514b8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b880 r8:80287e08 r7:eb2c9e60 r6:8514bc00 r5:85310c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d5fb0 to 0xeb2d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b8c140 INFO: task kworker/1:581:4779 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d0e8c000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:582:4781 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:582 state:D stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2ddd84 r8:00000002 r7:60000013 r6:eb2ddd8c r5:85311800 r4:85311800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85311800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:85311800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 r5:8537a78c r4:8537a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8537a78c r4:8514ba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85311800 r8:8514baac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514ba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514ba80 r8:80287e08 r7:eb2d5e60 r6:8514bd00 r5:85311800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2ddfb0 to 0xeb2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b8c000 INFO: task kworker/1:582:4781 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d0f03000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:583:4782 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:583 state:D stack:0 pid:4782 tgid:4782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2e1d84 r8:00000002 r7:60000113 r6:eb2e1d8c r5:85313000 r4:85313000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85313000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8c6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85313000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537af8c r4:8537ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8537af8c r4:8514bb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85313000 r8:8514bbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514bb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514bb80 r8:80287e08 r7:eb2dde60 r6:8514bc80 r5:85313000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e1fb0 to 0xeb2e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b8c280 INFO: task kworker/1:583:4782 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d1241000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:584:4785 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:584 state:D stack:0 pid:4785 tgid:4785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2e5d84 r8:00000002 r7:60000113 r6:eb2e5d8c r5:85312400 r4:85312400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85312400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8c4c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85312400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537ab8c r4:8537a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8537ab8c r4:8514bd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85312400 r8:8514bdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514bd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514bd80 r8:80287e08 r7:eb2e1e60 r6:8514bf00 r5:85312400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e5fb0 to 0xeb2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b8c1c0 INFO: task kworker/1:584:4785 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d14f8000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 INFO: task kworker/1:585:4788 blocked for more than 464 seconds. Workqueue: events bpf_prog_free_deferred [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537b38c r4:8537b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8537b38c r4:84b8d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85314800 r8:84b8d02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8d000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8d000 r8:80287e08 r7:eb2e1e60 r6:84b8d180 r5:85314800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb279fb0 to 0xeb279ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b8c680 INFO: task kworker/1:585:4788 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d14f8000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:586:4789 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:586 state:D stack:0 pid:4789 tgid:4789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2e9d84 r8:00000002 r7:60000113 r6:eb2e9d8c r5:85315400 r4:85315400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85315400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8c980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85315400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537b78c r4:8537b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8537b78c r4:84b8d080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85315400 r8:84b8d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8d080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8d080 r8:80287e08 r7:eb279e60 r6:84b8d100 r5:85315400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b8c780 INFO: task kworker/1:586:4789 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d1bc2000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:587:4792 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:587 state:D stack:0 pid:4792 tgid:4792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2edd84 r8:00000002 r7:60000113 r6:eb2edd8c r5:85316000 r4:85316000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85316000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8cc80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85316000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537bf8c r4:8537bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8537bf8c r4:84b8d200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85316000 r8:84b8d22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8d200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8d200 r8:80287e08 r7:eb2e9e60 r6:84b8d300 r5:85316000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2edfb0 to 0xeb2edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: d1bc2000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:82ac21e4 r4:e04bddc0 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:588:4793 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:588 state:D stack:0 pid:4793 tgid:4793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2f1d84 r8:00000002 r7:60000113 r6:eb2f1d8c r5:85316c00 r4:85316c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85316c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8cac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85316c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8537bb8c r4:8537b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8537bb8c r4:84b8d380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85316c00 r8:84b8d3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8d380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8d380 r8:80287e08 r7:eb2ede60 r6:84b8d280 r5:85316c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f1fb0 to 0xeb2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b8ca00 INFO: task kworker/1:588:4793 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d1f92000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:589:4795 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:589 state:D stack:0 pid:4795 tgid:4795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2f9d84 r8:00000002 r7:60000113 r6:eb2f9d8c r5:85318000 r4:85318000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85318000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8cf00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85318000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538438c r4:85384000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8538438c r4:84b8d400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85318000 r8:84b8d42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8d400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8d400 r8:80287e08 r7:eb2ede60 r6:84b8d580 r5:85318000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f9fb0 to 0xeb2f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b8cc40 INFO: task kworker/1:589:4795 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d1f92000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:590:4797 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:590 state:D stack:0 pid:4797 tgid:4797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2f5d84 r8:00000002 r7:60000113 r6:eb2f5d8c r5:85319800 r4:85319800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85319800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3c100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85319800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8538478c r4:85384400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85319800 r8:84b8d4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb2f5fb0 to 0xeb2f5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d2515000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:591:4800 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:591 state:D stack:0 pid:4800 tgid:4800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2fdd84 r8:00000002 r7:60000113 r6:eb2fdd8c r5:85318c00 r4:85318c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85318c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2fde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3c2c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85318c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85384b8c r4:85384800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85384b8c r4:84b8d500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85318c00 r8:84b8d52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8d500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8d500 r8:80287e08 r7:eb2f5e60 r6:84b8d700 r5:85318c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2fdfb0 to 0xeb2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3c0c0 INFO: task kworker/1:591:4800 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d263e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:592:4801 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:592 state:D stack:0 pid:4801 tgid:4801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb305d84 r8:00000002 r7:60000113 r6:eb305d8c r5:8531b000 r4:8531b000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8531b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb305e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3c740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8531b000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb117000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538538c r4:85385000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8538538c r4:84b8d780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8531b000 r8:84b8d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8d780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8d780 r8:80287e08 r7:eb2fde60 r6:84b8d600 r5:8531b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb305fb0 to 0xeb305ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3c280 INFO: task kworker/1:592:4801 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d2876000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8531c800 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3c4c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8531c800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb105000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85384f8c r4:85384c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85384f8c r4:84b8d800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8531c800 r8:84b8d82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8d800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8d800 r8:80287e08 r7:eb305e60 r6:84b8d980 r5:8531c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb309fb0 to 0xeb309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3c480 INFO: task kworker/1:593:4803 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e04bddc0 r5:00001000 r4:ed727000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:594:4806 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:594 state:D stack:0 pid:4806 tgid:4806 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb301e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8531d400 r8:84b8d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb301fb0 to 0xeb301ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85385b8c r4:85385800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:596 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb17b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Call trace: [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:597:4811 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:597 state:D stack:0 pid:4811 tgid:4811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eb325d84 r8:00000002 r7:60000113 r6:eb325d8c r5:8495e000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8538638c r4:85386000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8538638c r4:84b8db00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8495e000 r8:84b8db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8db00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8db00 r8:80287e08 r7:eb31de60 r6:84b41d80 r5:8495e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb325fb0 to 0xeb325ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Call trace: [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb329e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84b8d900 r4:84b3cac0 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 Not tainted 6.15.0-rc7-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb32de08 r7:ddde2d80 r6:83018200 r5:8538778c r4:84b8dc80 r4:84b3cac0 Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 Exception stack(0xe04bdfb0 to 0xe04bdff8) Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08 r5:852d138c r4:852d1000 r10:61c88647 r9:853b0c00 r8:8534efac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r5:85ef678c r4:85ef6400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08 r5:85386b8c r4:85386800 Exception stack(0xeb339fb0 to 0xeb339ff8) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:601:4820 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:601 state:D stack:0 pid:4820 tgid:4820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb33dd84 r8:00000002 r7:60000113 r6:eb33dd8c r5:853b2400 r4:853b2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853b2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb33de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532f040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb33f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85386f8c r4:85386c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85386f8c r4:84b8de00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853b2400 r8:84b8de2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8de00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d4295000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe04bdfb0 to 0xe04bdff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eb311d84 r8:00000002 r7:60000113 r6:eb311d8c r5:853b3000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:853b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d1b8c r4:852d1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d1b8c r4:8532e100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853b3000 r8:8532e12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8532e100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532e100 r8:80287e08 r7:eb26de60 r6:8532e000 r5:853b3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:602:4825 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:602 state:D stack:0 pid:4825 tgid:4825 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d5e08 r5:8538738c r4:85387000 r4:84b8dc00 r4:8532f1c0 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r5:85ef678c r4:85ef6400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:855ac78c r4:855ac400 r4:84b8dd00 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80050013 ffffffff [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Not tainted 6.15.0-rc7-syzkaller #0 r4:853b6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853b6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb355e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d2680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb201000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85387b8c r4:85387800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85387b8c r4:84b8de80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853b6000 r8:84b8deac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8de80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8de80 r8:80287e08 r7:eb1ede60 r6:8532e200 r5:853b6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb355fb0 to 0xeb355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8532f580 INFO: task kworker/1:604:4832 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d487b000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Not tainted 6.15.0-rc7-syzkaller #0 r4:853b6c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb30de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:852d238c r4:852d2000 r10:61c88647 r9:853b6c00 r8:8532e32c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:248:4834 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:248 state:D stack:0 pid:4834 tgid:4834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb211d84 r8:00000002 r7:60000113 r6:eb211d8c r5:853b3c00 r4:853b3c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853b3c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb211e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85334440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d278c r4:852d2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d278c r4:8532e380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853b3c00 r8:8532e3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8532e380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532e380 r8:80287e08 r7:eb30de60 r6:8532e400 r5:853b3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb211fb0 to 0xeb211ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85334100 INFO: task kworker/0:248:4834 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d4ded000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r5:85ef678c r4:85ef6400 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1fdd84 r8:00000002 r7:60000013 r6:eb1fdd8c r5:84a98000 r4:84a98000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a98000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1fde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85334640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac29000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d2b8c r4:852d2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d2b8c r4:8532e480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a98000 r8:8532e4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8532e480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532e480 r8:80287e08 r7:eb211e60 r6:8532e600 r5:84a98000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1fdfb0 to 0xeb1fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85334540 INFO: task kworker/0:249:4836 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d4ded000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:250:4837 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:250 state:D stack:0 pid:4837 tgid:4837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb229d84 r8:00000002 r7:60000113 r6:eb229d8c r5:8531bc00 r4:8531bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8531bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb229e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85334800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8531bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac59000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d338c r4:852d3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d338c r4:8532e500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8531bc00 r8:8532e52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8532e500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532e500 r8:80287e08 r7:eb1fde60 r6:84b8df00 r5:8531bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb229fb0 to 0xeb229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85334580 INFO: task kworker/0:250:4837 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d4f5f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:251:4841 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:251 state:D stack:0 pid:4841 tgid:4841 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb379d84 r8:00000002 r7:60000113 r6:eb379d8c r5:84958c00 r4:84958c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84958c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb379e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85334880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84958c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac9f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d378c r4:852d3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d378c r4:8532e780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84958c00 r8:8532e7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8532e780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532e780 r8:80287e08 r7:eb229e60 r6:84b8df80 r5:84958c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb379fb0 to 0xeb379ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853347c0 INFO: task kworker/0:251:4841 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d53f4000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:4843 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:4843 tgid:4843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb381d84 r8:00000002 r7:60000113 r6:eb381d8c r5:8531e000 r4:8531e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8531e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb381e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85334a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8531e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead89000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d3b8c r4:852d3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d3b8c r4:8532e700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8531e000 r8:8532e72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8532e700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532e700 r8:80287e08 r7:eb379e60 r6:8514be00 r5:8531e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb381fb0 to 0xeb381ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853348c0 INFO: task kworker/0:252:4843 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d5618000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:4845 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:4845 tgid:4845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb389d84 r8:00000002 r7:60000013 r6:eb389d8c r5:8531a400 r4:8531a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:8531a400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r5:8478e38c r4:8478e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8478e38c r4:8532e880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8531a400 r8:8532e8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8532e880 r10:00000000 r9:8532e880 r8:80287e08 r7:eb381e60 r6:8514be80 r5:8531a400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) dd60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:00000000 r5:00001000 r4:ed727000 r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:254:4846 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:254 state:D stack:0 pid:4846 tgid:4846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb391d84 r8:00000002 r7:60000013 r6:eb391d8c r5:85320c00 r4:85320c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85320c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb391e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85334bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85320c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d3f8c r4:852d3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d3f8c r4:8532e900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85320c00 r8:8532e92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8532e900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532e900 r8:80287e08 r7:eb389e60 r6:8514bf80 r5:85320c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb391fb0 to 0xeb391ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85334b80 INFO: task kworker/0:254:4846 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d58be000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:4848 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:4848 tgid:4848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb395d84 r8:00000002 r7:60000013 r6:eb395d8c r5:85321800 r4:85321800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85321800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85334e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85321800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae2d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e038c r4:852e0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e038c r4:8532e980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85321800 r8:8532e9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8532e980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532e980 r8:80287e08 r7:eb389e60 r6:849b1000 r5:85321800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb395fb0 to 0xeb395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85334d80 INFO: task kworker/0:255:4848 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d5b7d000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:256:4850 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:256 state:D stack:0 pid:4850 tgid:4850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb399d84 r8:00000002 r7:60000113 r6:eb399d8c r5:85322400 r4:85322400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85322400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb399e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841ab000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85322400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e078c r4:852e0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e078c r4:8532e800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85322400 r8:8532e82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8532e800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532e800 r8:80287e08 r7:eb395e60 r6:849b1080 r5:85322400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb399fb0 to 0xeb399ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85334e40 INFO: task kworker/0:256:4850 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d5c45000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:257:4853 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:257 state:D stack:0 pid:4853 tgid:4853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3a5d84 r8:00000002 r7:60000013 r6:eb3a5d8c r5:85324800 r4:85324800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85324800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472e040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85324800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf33000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e0b8c r4:852e0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e0b8c r4:8532ea80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85324800 r8:8532eaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8532ea80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532ea80 r8:80287e08 r7:eb399e60 r6:849b1100 r5:85324800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a5fb0 to 0xeb3a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472e000 INFO: task kworker/0:257:4853 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d621a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:258:4854 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:258 state:D stack:0 pid:4854 tgid:4854 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3a9d84 r8:00000002 r7:60000013 r6:eb3a9d8c r5:85325400 r4:85325400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85325400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472e200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85325400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e0f8c r4:852e0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e0f8c r4:8532ea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85325400 r8:8532ea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8532ea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532ea00 r8:80287e08 r7:eb3a5e60 r6:849b1180 r5:85325400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a9fb0 to 0xeb3a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472e000 INFO: task kworker/0:258:4854 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d621a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:259:4856 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:259 state:D stack:0 pid:4856 tgid:4856 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3b1d84 r8:00000002 r7:60000113 r6:eb3b1d8c r5:85323000 r4:85323000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85323000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472e5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85323000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e1b8c r4:852e1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e1b8c r4:8532eb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85323000 r8:8532eb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8532eb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532eb00 r8:80287e08 r7:eb3a9e60 r6:849b1200 r5:85323000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b1fb0 to 0xeb3b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472e1c0 INFO: task kworker/0:259:4856 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d65c4000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:4857 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:4857 tgid:4857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:eb38dd84 r8:00000002 r7:60000113 r6:eb38dd8c r5:84a99800 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb38de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472e340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a99800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf8d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e138c r4:852e1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e138c r4:8532ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a99800 r8:8532ec2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8532ec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532ec00 r8:80287e08 r7:eb3b1e60 r6:8532ec80 r5:84a99800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb38dfb0 to 0xeb38dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472e1c0 INFO: task kworker/0:260:4857 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d696e000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:261 state:D stack:0 pid:4861 tgid:4861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3add84 r8:00000002 r7:60000013 r6:eb3add8c r5:84a9a400 r4:84a9a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a9a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ade08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472e480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a9a400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:852e178c r4:852e1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a9a400 r8:8532edac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:262:4863 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84a9b000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84a9b000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 r5:852e278c r4:852e2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8532ee00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r5:00001000 r4:ed727000 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:84a9bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb255e08 r5:00001000 r4:eaff7000 r5:852e1f8c r4:852e1c00 r10:61c88647 r9:84a9bc00 r8:8532ebac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d6f20000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:264:4866 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:264 state:D stack:0 pid:4866 tgid:4866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3c1d84 r8:00000002 r7:60000013 r6:eb3c1d8c r5:84a9c800 r4:84a9c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a9c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472e900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb023000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e238c r4:852e2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e238c r4:8419f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a9c800 r8:8419f02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8419f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419f000 r8:80287e08 r7:eb3bde60 r6:8419f180 r5:84a9c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c1fb0 to 0xeb3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472e8c0 INFO: task kworker/0:264:4866 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d7182000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eb3c5d84 r8:00000002 r7:60000113 r6:eb3c5d8c r5:84a9d400 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a9d400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb051000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e2b8c r4:852e2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e2b8c r4:8419f080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a9d400 r8:8419f0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8419f080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419f080 r8:80287e08 r7:eb3bde60 r6:8419f280 r5:84a9d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c5fb0 to 0xeb3c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472e980 INFO: task kworker/0:265:4868 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d7489000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a9e000 r4:8291a680 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:852e2f8c r4:852e2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8419f100 r8:80287e08 r7:eb3c5e60 r6:8419f200 r5:84a9e000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84a9ec00 r4:8291a680 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:852e338c r4:852e3000 r7:dddced80 r6:83018000 r5:852e338c r4:8419f300 r10:00000000 r9:8419f300 r8:80287e08 r7:eb3c9e60 r6:8419f480 r5:84a9ec00 Workqueue: events bpf_prog_free_deferred [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d77c4000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:268:4875 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:268 state:D stack:0 pid:4875 tgid:4875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3d1d84 r8:00000002 r7:60000113 r6:eb3d1d8c r5:84a98c00 r4:84a98c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a98c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b47580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a98c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e838c r4:852e8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e838c r4:8419f380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a98c00 r8:8419f3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8419f380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419f380 r8:80287e08 r7:eb3cde60 r6:8419f500 r5:84a98c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d1fb0 to 0xeb3d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b47080 INFO: task kworker/0:268:4875 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d7ac1000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:269:4876 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:269 state:D stack:0 pid:4876 tgid:4876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3d5d84 r8:00000002 r7:60000013 r6:eb3d5d8c r5:853c0000 r4:853c0000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c0000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b47040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb08d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e378c r4:852e3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e378c r4:8419f580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c0000 r8:8419f5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8419f580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419f580 r8:80287e08 r7:eb3d1e60 r6:8419f400 r5:853c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d5fb0 to 0xeb3d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b47080 INFO: task kworker/0:269:4876 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d7ac1000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:270:4879 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:270 state:D stack:0 pid:4879 tgid:4879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3d9d84 r8:00000002 r7:60000113 r6:eb3d9d8c r5:853c0c00 r4:853c0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:852e3b8c r4:852e3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:853c0c00 r8:8419f62c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8419f600 r8:80287e08 r7:eb3d1e60 r6:8419f700 r5:853c0c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:271:4880 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:271 state:D stack:0 pid:4880 tgid:4880 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3ddd84 r8:00000002 r7:60000113 r6:eb3ddd8c r5:853c1800 r4:853c1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3dde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b47300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e3f8c r4:852e3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e3f8c r4:8419f780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c1800 r8:8419f7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8419f780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419f780 r8:80287e08 r7:eb3d1e60 r6:8419f680 r5:853c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3ddfb0 to 0xeb3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b47480 INFO: task kworker/0:271:4880 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d83ea000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:272:4882 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:272 state:D stack:0 pid:4882 tgid:4882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3e9d84 r8:00000002 r7:60000113 r6:eb3e9d8c r5:85323c00 r4:85323c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85323c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b47600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85323c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e878c r4:852e8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e878c r4:8419f800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85323c00 r8:8419f82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8419f800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419f800 r8:80287e08 r7:eb3d1e60 r6:849b1280 r5:85323c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e9fb0 to 0xeb3e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b47540 INFO: task kworker/0:272:4882 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d83ea000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:273:4884 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:273 state:D stack:0 pid:4884 tgid:4884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3f1d84 r8:00000002 r7:60000113 r6:eb3f1d8c r5:85326000 r4:85326000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85326000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b477c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85326000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e8b8c r4:852e8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e8b8c r4:8419f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85326000 r8:8419f9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8419f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419f980 r8:80287e08 r7:eb3e9e60 r6:849b1300 r5:85326000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f1fb0 to 0xeb3f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b47640 INFO: task kworker/0:273:4884 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d86e5000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:274:4886 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:274 state:D stack:0 pid:4886 tgid:4886 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3f9d84 r8:00000002 r7:60000013 r6:eb3f9d8c r5:85320000 r4:85320000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85320000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b47b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85320000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb217000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e938c r4:852e9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e938c r4:8419f900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85320000 r8:8419f92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8419f900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419f900 r8:80287e08 r7:eb3f1e60 r6:849b1380 r5:85320000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b47700 INFO: task kworker/0:274:4886 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d88cf000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:275:4887 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:275 state:D stack:0 pid:4887 tgid:4887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3fdd84 r8:00000002 r7:60000113 r6:eb3fdd8c r5:85313c00 r4:85313c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85313c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3fde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b47980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85313c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e8f8c r4:852e8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e8f8c r4:8419fa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85313c00 r8:8419fa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8419fa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419fa00 r8:80287e08 r7:eb3f9e60 r6:849b1400 r5:85313c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3fdfb0 to 0xeb3fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b47700 INFO: task kworker/0:275:4887 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d88cf000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:605:4890 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:605 state:D stack:0 pid:4890 tgid:4890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3e1d84 r8:00000002 r7:60000113 r6:eb3e1d8c r5:8531ec00 r4:8531ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8531ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541ae00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8531ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb549000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544d78c r4:8544d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544d78c r4:849b1480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8531ec00 r8:849b14ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849b1480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b1480 r8:80287e08 r7:eb1ede60 r6:849b1600 r5:8531ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e1fb0 to 0xeb3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d2640 INFO: task kworker/1:605:4890 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d8e61000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:276:4892 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:276 state:D stack:0 pid:4892 tgid:4892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb401d84 r8:00000002 r7:60000113 r6:eb401d8c r5:853e0000 r4:853e0000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e0000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb401e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b47c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb22d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e978c r4:852e9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e978c r4:8419f880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e0000 r8:8419f8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8419f880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419f880 r8:80287e08 r7:eb3f9e60 r6:849b1500 r5:853e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb401fb0 to 0xeb401ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b47940 INFO: task kworker/0:276:4892 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d8e61000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:277:4894 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:277 state:D stack:0 pid:4894 tgid:4894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb405d84 r8:00000002 r7:60000013 r6:eb405d8c r5:853e0c00 r4:853e0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b21000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ea78c r4:852ea400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ea78c r4:8419fb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e0c00 r8:8419fb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8419fb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419fb00 r8:80287e08 r7:eb401e60 r6:849b1580 r5:853e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b47a40 INFO: task kworker/0:277:4894 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d9375000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:278:4895 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:278 state:D stack:0 pid:4895 tgid:4895 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb409d84 r8:00000002 r7:60000113 r6:eb409d8c r5:853e1800 r4:853e1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb409e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b47dc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb24f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e9b8c r4:852e9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e9b8c r4:8419fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8419fc00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd20: d9ea7000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:279:4898 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:279 state:D stack:0 pid:4898 tgid:4898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb411d84 r8:00000002 r7:60000113 r6:eb411d8c r5:853e3000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb411e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b47e40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852e9f8c r4:852e9c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:00000000 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r4:e04bddc0 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:280:4900 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:280 state:D stack:0 pid:4900 tgid:4900 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb415d84 r8:00000002 r7:60000013 r6:eb415d8c r5:853e3c00 r4:853e3c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e3c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb415e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472ee40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb265000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ea38c r4:852ea000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ea38c r4:8419fc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e3c00 r8:8419fcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8419fc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419fc80 r8:80287e08 r7:eb405e60 r6:849b1780 r5:853e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb415fb0 to 0xeb415ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b47c00 INFO: task kworker/0:280:4900 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d9ea7000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:281:4902 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:281 state:D stack:0 pid:4902 tgid:4902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb41dd84 r8:00000002 r7:60000013 r6:eb41dd8c r5:853e4800 r4:853e4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b21480 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: da619000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r5:85ef678c r4:85ef6400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb425d84 r8:00000002 r7:60000013 r6:eb425d8c r5:853e5400 r4:853e5400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e5400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb425e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b21200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb419000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852eab8c r4:852ea800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852eab8c r4:8419fe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e5400 r8:8419fe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8419fe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419fe00 r8:80287e08 r7:eb41de60 r6:849b1880 r5:853e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb425fb0 to 0xeb425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b211c0 INFO: task kworker/0:282:4904 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: daf1a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb431d84 r8:00000002 r7:60000013 r6:eb431d8c r5:853e6000 r4:853e6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb431e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b21340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb427000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852eaf8c r4:852eac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852eaf8c r4:8419fe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e6000 r8:8419feac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8419fe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419fe80 r8:80287e08 r7:eb41de60 r6:849b1900 r5:853e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb431fb0 to 0xeb431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b21280 INFO: task kworker/0:283:4906 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: daf1a000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:284:4908 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:284 state:D stack:0 pid:4908 tgid:4908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb439d84 r8:00000002 r7:60000013 r6:eb439d8c r5:853e6c00 r4:853e6c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:852ebb8c r4:8419ff00 r10:00000000 r9:8419ff00 r8:80287e08 r7:eb41de60 r6:849b1980 r5:853e6c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb43dd84 r8:00000002 r7:60000013 r6:eb43dd8c r5:853e2400 r4:853e2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b215c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852eb78c r4:852eb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852eb78c r4:8532ef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e2400 r8:8532ef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8532ef00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532ef00 r8:80287e08 r7:eb439e60 r6:849b1a00 r5:853e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb43dfb0 to 0xeb43dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b21440 INFO: task kworker/0:285:4910 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: db6fb000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:286:4912 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:286 state:D stack:0 pid:4912 tgid:4912 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb441d84 r8:00000002 r7:60000113 r6:eb441d8c r5:853e8000 r4:853e8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ec38c r4:852ec000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ec38c r4:8419fa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e8000 r8:8419faac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8419fa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419fa80 r8:80287e08 r7:eb439e60 r6:849b1a80 r5:853e8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb441fb0 to 0xeb441ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b21700 INFO: task kworker/0:286:4912 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb445d84 r8:00000002 r7:60000113 r6:eb445d8c r5:853e8c00 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ebf8c r4:852ebc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ebf8c r4:8419ff80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e8c00 r8:8419ffac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8419ff80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8419ff80 r8:80287e08 r7:eb441e60 r6:849b1b00 r5:853e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb445fb0 to 0xeb445ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b21580 INFO: task kworker/0:287:4913 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dc384000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:288:4915 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:288 state:D stack:0 pid:4915 tgid:4915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb449d84 r8:00000002 r7:60000113 r6:eb449d8c r5:853e9800 r4:853e9800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e9800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb449e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b21ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ec78c r4:852ec400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ec78c r4:849c8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e9800 r8:849c802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c8000 r8:80287e08 r7:eb441e60 r6:849b1b80 r5:853e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb449fb0 to 0xeb449ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b216c0 INFO: task kworker/0:288:4915 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 dd20: dc7ca000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 Not tainted 6.15.0-rc7-syzkaller #0 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:853ebc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ebc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb455e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b21c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ecb8c r4:852ec800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ecb8c r4:849c8080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ebc00 r8:849c80ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c8080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c8080 r8:80287e08 r7:eb449e60 r6:849b1c00 r5:853ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb455fb0 to 0xeb455ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b21bc0 INFO: task kworker/0:289:4918 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd20: dc7ca000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:e04bddc0 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:290 state:D stack:0 pid:4920 tgid:4920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb45dd84 r8:00000002 r7:60000013 r6:eb45dd8c r5:853ea400 r4:853ea400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ea400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b21ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ed38c r4:852ed000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ed38c r4:849c8180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ea400 r8:849c81ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c8180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c8180 r8:80287e08 r7:eb455e60 r6:849b1c80 r5:853ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb45dfb0 to 0xeb45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b21c00 INFO: task kworker/0:290:4920 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dcc3b000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:291:4921 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:853c3c00 r4:8291a680 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb40de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b21cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ecf8c r4:852ecc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ecf8c r4:849c8280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c3c00 r8:849c82ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c8280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c8280 r8:80287e08 r7:eb45de60 r6:849c8300 r5:853c3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb40dfb0 to 0xeb40dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b21c00 INFO: task kworker/0:291:4921 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dcc3b000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:292 state:D stack:0 pid:4923 tgid:4923 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b47d80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ed78c r4:852ed400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ed78c r4:849c8200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c4800 r8:849c822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c8200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c8200 r8:80287e08 r7:eb45de60 r6:849c8400 r5:853c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb461fb0 to 0xeb461ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b21d00 INFO: task kworker/0:292:4923 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dd0fa000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:293:4927 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:293 state:D stack:0 pid:4927 tgid:4927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb465d84 r8:00000002 r7:60000013 r6:eb465d8c r5:853c5400 r4:853c5400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c5400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb465e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84578940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852edb8c r4:852ed800 r7:dddced80 r6:83018000 r5:852edb8c r4:849c8100 r10:61c88647 r9:853c5400 r8:849c812c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dd604000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:294:4928 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:294 state:D stack:0 pid:4928 tgid:4928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb469d84 r8:00000002 r7:60000113 r6:eb469d8c r5:853c6000 r4:853c6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4d040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead7b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852edf8c r4:852edc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852edf8c r4:849c8500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c6000 r8:849c852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c8500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c8500 r8:80287e08 r7:eb465e60 r6:849c8600 r5:853c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb469fb0 to 0xeb469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b4d0c0 INFO: task kworker/0:294:4928 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dd8f0000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:295 state:D stack:0 pid:4930 tgid:4930 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:852ee38c r4:849c8380 r10:00000000 r9:849c8380 r8:80287e08 r7:eb469e60 r6:849b1d00 r5:853ed400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:00000000 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:296:4933 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:296 state:D stack:0 pid:4933 tgid:4933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb481d84 r8:00000002 r7:60000113 r6:eb481d8c r5:853eb000 r4:853eb000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853eb000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb481e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4d340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ee78c r4:852ee400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ee78c r4:849c8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853eb000 r8:849c85ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c8580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c8580 r8:80287e08 r7:eb475e60 r6:849b1d80 r5:853eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb481fb0 to 0xeb481ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:84b4d1c0 Call trace: r4:00000000 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:297:4934 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:297 state:D stack:0 pid:4934 tgid:4934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb485d84 r8:00000002 r7:60000113 r6:eb485d8c r5:853eec00 r4:853eec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853eec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb485e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4d480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852eeb8c r4:852ee800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852eeb8c r4:849c8700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853eec00 r8:849c872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c8700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c8700 r8:80287e08 r7:eb481e60 r6:849b1e00 r5:853eec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb485fb0 to 0xeb485ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b4d580 INFO: task kworker/0:297:4934 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ddc36000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:4936 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:4936 tgid:4936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb46dd84 r8:00000002 r7:60000113 r6:eb46dd8c r5:853c6c00 r4:853c6c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4d780 r5:00001000 r4:eb0fd000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:853c6c00 r8:849c882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:00000000 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84b392c0 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:853c2400 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4d5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852eef8c r4:852eec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852eef8c r4:849c8780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c2400 r8:849c87ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c8780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c8780 r8:80287e08 r7:eb46de60 r6:849c8680 r5:853c2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e5fb0 to 0xeb3e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b4d3c0 INFO: task kworker/0:299:4938 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb489d84 r8:00000002 r7:60000113 r6:eb489d8c r5:853c3000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb489e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4da80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb15f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852efb8c r4:852ef800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852efb8c r4:849c8900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c3000 r8:849c892c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c8900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c8900 r8:80287e08 r7:eb46de60 r6:849c8a00 r5:853c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb489fb0 to 0xeb489ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b4d740 INFO: task kworker/0:300:4941 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: de8f9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:301:4942 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:301 state:D stack:0 pid:4942 tgid:4942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb491d84 r8:00000002 r7:60000013 r6:eb491d8c r5:85326c00 r4:85326c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85326c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ef78c r4:852ef400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:849c8a80 r8:80287e08 r7:eb489e60 r6:849c8980 r5:85326c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:302:4944 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:302 state:D stack:0 pid:4944 tgid:4944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb495d84 r8:00000002 r7:60000113 r6:eb495d8c r5:853c8000 r4:853c8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4dd40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb193000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544038c r4:85440000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8544038c r4:849c8b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c8000 r8:849c8b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c8b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c8b00 r8:80287e08 r7:eb489e60 r6:849c8c80 r5:853c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb495fb0 to 0xeb495ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b4da40 INFO: task kworker/0:302:4944 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dee68000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:303:4946 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:303 state:D stack:0 pid:4946 tgid:4946 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb499d84 r8:00000002 r7:60000113 r6:eb499d8c r5:853c8c00 r4:853c8c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c8c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb499e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4dc00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb173000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852eff8c r4:852efc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852eff8c r4:849c8b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c8c00 r8:849c8bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c8b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c8b80 r8:80287e08 r7:eb495e60 r6:849c8d00 r5:853c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb499fb0 to 0xeb499ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b4dbc0 INFO: task kworker/0:303:4946 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: defc2000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:304:4947 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:304 state:D stack:0 pid:4947 tgid:4947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb49dd84 r8:00000002 r7:60000113 r6:eb49dd8c r5:853c9800 r4:853c9800 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:853c9800 r8:849c8dac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb49dfb0 to 0xeb49dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b4dbc0 INFO: task kworker/0:304:4947 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: df24b000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:4949 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:4949 tgid:4949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb48dd84 r8:00000002 r7:60000013 r6:eb48dd8c r5:853ca400 r4:853ca400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ca400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8544078c r4:849c8e00 r4:849c8e00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: df7db000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r5:00001000 r4:ed727000 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85440b8c r4:85440800 r7:dddced80 r6:83018000 r5:85440b8c r4:8419fd00 r10:00000000 r9:8419fd00 r8:80287e08 r7:eb49de60 r6:8532ef80 r5:853cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a1fb0 to 0xeb4a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85080240 INFO: task kworker/0:306:4952 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dfb95000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:307:4955 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:307 state:D stack:0 pid:4955 tgid:4955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4add84 r8:00000002 r7:60000113 r6:eb4add8c r5:853cbc00 r4:853cbc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853cbc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8544178c r4:84b48000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853cbc00 r8:84b4802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b48000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b48000 r8:80287e08 r7:eb49de60 r6:84b48080 r5:853cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4adfb0 to 0xeb4adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85080100 INFO: task kworker/0:307:4955 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dfb95000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f565000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85ef6b8c r4:849ffe00 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:308:4956 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:4956 tgid:4956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85080300 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544138c r4:85441000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:853cc800 r8:84b4812c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 7f7f2000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:900d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:309:4958 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:309 state:D stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b1d84 r8:00000002 r7:60000113 r6:eb4b1d8c r5:853cd400 r5:853cd400 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:853cd400 r8:84b4822c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:4960 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:4960 tgid:4960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b5d84 r8:00000002 r7:60000113 r6:eb4b5d8c r5:853ce000 r4:853ce000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ce000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850807c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb343000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85441f8c r4:85441c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85441f8c r4:84b48380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ce000 r8:84b483ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b48380 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:84aebb8c r4:84aeb800 9fa0: 00000000 00000000 00000000 00000000 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:311:4962 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:311 state:D stack:0 pid:4962 tgid:4962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b9d84 r8:00000002 r7:60000113 r6:eb4b9d8c r5:853cec00 r4:853cec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853cec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0029d28 to 0xe0029d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r7:dddced80 r6:83018000 r5:85442b8c r4:84b48580 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: 7f7f2000 ed729000 00000001 80239b98 7f565000 00000001 r5:900d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:313:4966 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:313 state:D stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:eb4c9d84 r8:00000002 r7:60000013 r6:eb4c9d8c r5:84649800 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544278c r4:85442400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b48600 r8:80287e08 r7:eb4bde60 r6:84b48780 r5:84649800 r4:85080a80 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:4968 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:4968 tgid:4968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4c1d84 r8:00000002 r7:60000013 r6:eb4c1d8c r5:84648c00 r4:84648c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84648c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85080ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84648c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85442f8c r4:85442c00 r7:dddced80 r6:83018000 r5:85442f8c r4:84b48680 r10:00000000 r9:84b48680 r8:80287e08 r7:eb4bde60 r6:84b48800 r5:84648c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c1fb0 to 0xeb4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85080bc0 INFO: task kworker/0:314:4968 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 7fde8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:900d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r5:00001000 r4:dfe13000 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:315:4970 blocked for more than 466 seconds. task:kworker/0:315 state:D stack:0 pid:4970 tgid:4970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4ddd84 r8:00000002 r7:60000113 r6:eb4ddd8c r5:8464bc00 r4:8464bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8464bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4dde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541a140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8464bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544338c r4:85443000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8544338c r4:84b48880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8464bc00 r8:84b488ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb4ddfb0 to 0xeb4ddff8) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:900d0113 r4:80239bb0 r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849a8000 Exception stack(0xe0029fb0 to 0xe0029ff8) INFO: task kworker/0:316:4971 blocked for more than 466 seconds. [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541a340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8464a400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544378c r4:85443400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8544378c r4:84b48900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8464a400 r8:84b4892c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b48900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b48900 r8:80287e08 r7:eb4dde60 r6:84b48a80 r5:8464a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e9fb0 to 0xeb4e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8541a200 INFO: task kworker/0:316:4971 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:317:4974 blocked for more than 466 seconds. r10:8291a684 r9:eb4d9d84 r8:00000002 r7:60000113 r6:eb4d9d8c r5:8464c800 r4:8464c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8464c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541a480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8464c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85443b8c r4:85443800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85443b8c r4:84b48980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8464c800 r8:84b489ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b48980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b48980 r8:80287e08 r7:eb4e9e60 r6:84b48b00 r5:8464c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d9fb0 to 0xeb4d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8541a580 INFO: task kworker/0:317:4974 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe0029d28 to 0xe0029d70) r5:900d0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:318:4976 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85443f8c r4:85443c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85443f8c r4:84b48b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8464d400 r8:84b48bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b48b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b48b80 r8:80287e08 r7:eb4d9e60 r6:84b48a00 r5:8464d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f5fb0 to 0xeb4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8541a3c0 INFO: task kworker/0:318:4976 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 7fde8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:900d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:319 state:D stack:0 pid:4978 tgid:4978 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb515d84 r8:00000002 r7:60000013 r6:eb515d8c r5:853f0000 r4:853f0000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f0000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541a6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb50b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544c38c r4:8544c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8544c38c r4:84b48c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f0000 r8:84b48c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b48c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b48c00 r8:80287e08 r7:eb4f5e60 r6:849b1e80 r5:853f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb515fb0 to 0xeb515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:900d0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe0029fb0 to 0xe0029ff8) r4:8462f100 Workqueue: events bpf_prog_free_deferred [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb521d84 r8:00000002 r7:60000113 r6:eb521d8c r5:853f1800 r4:853f1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb521e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484b780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb561000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544df8c r4:8544dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8544df8c r4:84b48d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f1800 r8:84b48dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b48d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b48d80 r8:80287e08 r7:eb515e60 r6:849b1f00 r5:853f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb521fb0 to 0xeb521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8541a700 INFO: task kworker/0:320:4980 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 7fde8000 ed729000 00000001 80239b98 7f565000 00000001 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:321 state:D stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541a840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb511000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544c78c r4:8544c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8544c78c r4:84b48d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f3000 r8:84b48d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b48d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b48d00 r8:80287e08 r7:eb521e60 r6:849b1f80 r5:853f3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb525fb0 to 0xeb525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8541a700 INFO: task kworker/0:321:4981 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 7fde8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:900d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:853f4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541ab00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb535000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544cf8c r4:8544cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8544cf8c r4:84b48e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f4800 r8:84b48e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b48e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b48e00 r8:80287e08 r7:eb521e60 r6:85429000 r5:853f4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8541a940 INFO: task kworker/0:322:4983 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 7fde8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:900d0113 r4:80239bb0 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:323:4986 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:853f5400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541ab40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544d38c r4:8544d000 r10:61c88647 r9:853f5400 r8:84b48cac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:324:4988 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:324 state:D stack:0 pid:4988 tgid:4988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb559d84 r8:00000002 r7:60000113 r6:eb559d8c r5:853f3c00 r4:853f3c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f3c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541ae80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544db8c r4:8544d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8544db8c r4:849c8f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f3c00 r8:849c8f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c8f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c8f00 r8:80287e08 r7:eb521e60 r6:85429100 r5:853f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb559fb0 to 0xeb559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d60: 80230ad0 80239bb0 900d0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:606:4991 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:606 state:D stack:0 pid:4991 tgid:4991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb56dd84 r8:00000002 r7:60000013 r6:eb56dd8c r5:853f6c00 r4:853f6c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85533000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8427cf8c r4:85429180 r10:00000000 r9:85429180 r8:80287e08 r7:eb1ede60 r6:85429200 r5:853f6c00 r4:854237c0 Call trace: 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:325:4992 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:325 state:D stack:0 pid:4992 tgid:4992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb571d84 r8:00000002 r7:60000113 r6:eb571d8c r5:853f6000 r4:853f6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542f000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544e78c r4:8544e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8544e78c r4:84b48f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f6000 r8:84b48f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b48f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b48f00 r8:80287e08 r7:eb521e60 r6:85429280 r5:853f6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb571fb0 to 0xeb571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8484b840 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:326:4994 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:326 state:D stack:0 pid:4994 tgid:4994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb371d84 r8:00000002 r7:60000113 r6:eb371d8c r5:853f2400 r4:853f2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb371e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85080f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df83d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544e38c r4:8544e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8544e38c r4:84b48f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f2400 r8:84b48fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b48f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b48f80 r8:80287e08 r7:eb571e60 r6:85429300 r5:853f2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb371fb0 to 0xeb371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85080e80 INFO: task kworker/0:326:4994 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 7fde8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:900d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:327:4996 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:327 state:D stack:0 pid:4996 tgid:4996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3b5d84 r8:00000002 r7:60000113 r6:eb3b5d8c r5:853ee000 r4:853ee000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ee000 r4:8291a680 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544fb8c r4:8544f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8544fb8c r4:84b48e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ee000 r8:84b48eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b48e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b48e80 r8:80287e08 r7:eb571e60 r6:85429380 r5:853ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b5fb0 to 0xeb3b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85080e80 INFO: task kworker/0:327:4996 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 7fde8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:900d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:328 state:D stack:0 pid:4998 tgid:4998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb57dd84 r8:00000002 r7:60000113 r6:eb57dd8c r5:853ec800 r4:853ec800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ec800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542f1c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa51000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544eb8c r4:8544e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8544eb8c r4:85431080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ec800 r8:854310ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:329:5001 blocked for more than 467 seconds. r10:8291a684 r9:eb589d84 r8:00000002 r7:60000113 r6:eb589d8c r5:853f9800 r4:853f9800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f9800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542f240 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544ef8c r4:8544ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8544ef8c r4:85431000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f9800 r8:8543102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85431000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85431000 r8:80287e08 r7:eb3b5e60 r6:85429480 r5:853f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb589fb0 to 0xeb589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8542f180 INFO: task kworker/0:329:5001 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 7fde8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:900d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:330:5003 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:330 state:D stack:0 pid:5003 tgid:5003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb591d84 r8:00000002 r7:60000013 r6:eb591d8c r5:853f8000 r4:853f8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb591e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542f400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544f38c r4:8544f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:853f8000 r8:854311ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:331:5004 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:331 state:D stack:0 pid:5004 tgid:5004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb501d84 r8:00000002 r7:60000113 r6:eb501d8c r5:8464e000 r4:8464e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8464e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb501e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542f540 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb501fb0 to 0xeb501ff8) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: 7fde8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:900d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544ff8c r4:8544fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8544ff8c r4:85431200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8464ec00 r8:8543122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85431200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85431200 r8:80287e08 r7:eb3b5e60 r6:85431380 r5:8464ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb58dfb0 to 0xeb58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8542f5c0 INFO: task kworker/0:332:5007 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 7fde8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:900d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r5:84aebb8c r4:84aeb800 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:8462f100 Workqueue: events bpf_prog_free_deferred r5:8464b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542fbc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8464b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf85000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85454b8c r4:85454800 r10:61c88647 r9:8464b000 r8:8543142c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:900d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8462f100 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545438c r4:85454000 r7:dddced80 r6:83018000 r5:8545438c r4:85431480 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 7fde8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:900d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:853d0c00 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545478c r4:85454400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb5a1fb0 to 0xeb5a1ff8) r4:8542fb00 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:900d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:336:5016 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:336 state:D stack:0 pid:5016 tgid:5016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5a9d84 r8:00000002 r7:60000113 r6:eb5a9d8c r5:853d1800 r4:853d1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545538c r4:85455000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545538c r4:85431700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d1800 r8:8543172c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85431700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85431700 r8:80287e08 r7:eb4ede60 r6:85431800 r5:853d1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a9fb0 to 0xeb5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8542fc00 INFO: task kworker/0:336:5016 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 7fde8000 ed729000 00000001 80239b98 7f565000 00000001 r5:900d0113 r4:80239bb0 r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:853d2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542fdc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85454f8c r4:85454c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85454f8c r4:85431580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d2400 r8:854315ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85431580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85431580 r8:80287e08 r7:eb5a9e60 r6:85431900 r5:853d2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ade08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547e400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb047000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85455b8c r4:85455800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85455b8c r4:85431780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d3000 r8:854317ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85431780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85431780 r8:80287e08 r7:eb5a9e60 r6:85431880 r5:853d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5adfb0 to 0xeb5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547e000 INFO: task kworker/0:338:5019 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 7fde8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:900d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5b1d84 r8:00000002 r7:60000013 r6:eb5b1d8c r5:853d3c00 r4:853d3c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d3c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547e280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb025000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545578c r4:85455400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545578c r4:85431980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d3c00 r8:854319ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85431980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85431980 r8:80287e08 r7:eb5ade60 r6:85431b00 r5:853d3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b1fb0 to 0xeb5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547e000 INFO: task kworker/0:339:5020 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 7fde8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:900d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:340:5023 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:340 state:D stack:0 pid:5023 tgid:5023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5b5d84 r8:00000002 r7:60000113 r6:eb5b5d8c r5:853d4800 r4:853d4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb063000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb5b5fb0 to 0xeb5b5ff8) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:900d0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:341:5025 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:341 state:D stack:0 pid:5025 tgid:5025 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:eb5b9d84 r8:00000002 r7:60000013 r6:eb5b9d8c r5:853d5400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547e900 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8545678c r4:85431a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d60: 80230ad0 80239bb0 900d0113 ffffffff r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:342:5026 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:342 state:D stack:0 pid:5026 tgid:5026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5c1d84 r8:00000002 r7:60000013 r6:eb5c1d8c r5:853d6000 r4:853d6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547e680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb08b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545638c r4:85456000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545638c r4:85431d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d6000 r8:85431d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85431d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85431d00 r8:80287e08 r7:eb5b9e60 r6:85431b80 r5:853d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c1fb0 to 0xeb5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8462f100 Workqueue: events bpf_prog_free_deferred r5:853d6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ea40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85456b8c r4:85456800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85456b8c r4:85431d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d6c00 r8:85431dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85431d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85431d80 r8:80287e08 r7:eb5b9e60 r6:85431f00 r5:853d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547e5c0 INFO: task kworker/0:343:5029 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 7fde8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 900d0113 ffffffff r5:900d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:344:5031 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:5031 tgid:5031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5c9d84 r8:00000002 r7:60000113 r6:eb5c9d8c r5:84ab8000 r4:84ab8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547eb80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85456f8c r4:85456c00 r10:61c88647 r9:84ab8000 r8:85431fac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) r5:900d0113 r4:80239bb0 r4:e0029dc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:345:5033 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:345 state:D stack:0 pid:5033 tgid:5033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5cdd84 r8:00000002 r7:60000013 r6:eb5cdd8c r5:84ab8c00 r4:84ab8c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab8c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542fd80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb21f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85457b8c r4:85457800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ab8c00 r8:8549202c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:346:5035 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:346 state:D stack:0 pid:5035 tgid:5035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5c5d84 r8:00000002 r7:60000013 r6:eb5c5d8c r5:84ab9800 r4:84ab9800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab9800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ed00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab9800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545738c r4:85457000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb5c5fb0 to 0xeb5c5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547eac0 INFO: task kworker/0:346:5035 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 82391000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb5d1d84 r8:00000002 r7:60000113 r6:eb5d1d8c r5:84aba400 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: 82771000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:348:5039 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:348 state:D stack:0 pid:5039 tgid:5039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:84abb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85492280 r8:80287e08 r7:eb5cde60 r6:85492400 r5:84abb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d5fb0 to 0xeb5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85423ec0 INFO: task kworker/0:348:5039 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 82771000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:84abbc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5dde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ee80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84abbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb237000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85457f8c r4:85457c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85457f8c r4:85492480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84abbc00 r8:854924ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85492480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85492480 r8:80287e08 r7:eb5d5e60 r6:85492500 r5:84abbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5ddfb0 to 0xeb5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549a000 INFO: task kworker/0:349:5042 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 82c1f000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84abc800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549a180 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545c78c r4:8545c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545c78c r4:85492580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84abc800 r8:854925ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85492580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85492580 r8:80287e08 r7:eb5d5e60 r6:85492300 r5:84abc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e5fb0 to 0xeb5e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549a000 INFO: task kworker/0:350:5043 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 83067000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r4:849a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:351:5045 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:351 state:D stack:0 pid:5045 tgid:5045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5d9d84 r8:00000002 r7:60000013 r6:eb5d9d8c r5:84abd400 r4:84abd400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84abd400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549a3c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84abd400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84abd400 r8:8549262c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfe13000 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84abe000 r4:8291a680 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549a500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84abe000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545cf8c r4:8545cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545cf8c r4:85492700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84abe000 r8:8549272c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85492700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85492700 r8:80287e08 r7:eb5d9e60 r6:85492800 r5:84abe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e9fb0 to 0xeb5e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549a380 INFO: task kworker/0:352:5047 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) r5:800d0113 r4:80239bb0 r4:e0029dc0 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb5f1d84 r8:00000002 r7:60000013 r6:eb5f1d8c r5:854b8000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549a800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb39f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545d38c r4:8545d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545d38c r4:85492880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b8000 r8:854928ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85492880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85492880 r8:80287e08 r7:eb5e9e60 r6:85492780 r5:854b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549a440 INFO: task kworker/0:353:5049 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 83a5d000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8462f100 Workqueue: events bpf_prog_free_deferred r4:854b8c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854b8c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549aac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545d78c r4:8545d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545d78c r4:85492900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b8c00 r8:8549292c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85492900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85492900 r8:80287e08 r7:eb5f1e60 r6:85492a80 r5:854b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f5fb0 to 0xeb5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549a900 INFO: task kworker/0:354:5050 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 83fc7000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eb5f9d84 r8:00000002 r7:60000113 r6:eb5f9d8c r5:854ba400 r4:854ba400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854ba400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549ab40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb417000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545db8c r4:8545d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545db8c r4:85492980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854ba400 r8:854929ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85492980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85492980 r8:80287e08 r7:eb5f5e60 r6:85492a00 r5:854ba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f9fb0 to 0xeb5f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549a380 INFO: task kworker/0:355:5052 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) r5:800d0113 r4:80239bb0 r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:854bb000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549aec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb435000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545e38c r4:8545e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545e38c r4:85492b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854bb000 r8:85492b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85492b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85492b00 r8:80287e08 r7:eb5f9e60 r6:85492c00 r5:854bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5edfb0 to 0xeb5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549ab80 INFO: task kworker/0:356:5055 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 841cd000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:357:5057 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:357 state:D stack:0 pid:5057 tgid:5057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb601d84 r8:00000002 r7:60000113 r6:eb601d8c r5:854bbc00 r4:854bbc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854bbc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 r4:00000000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549ad40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb429000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545df8c r4:8545dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545df8c r4:85492c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854bbc00 r8:85492cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85492c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85492c80 r8:80287e08 r7:eb5ede60 r6:85492d80 r5:854bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549ab80 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:358:5060 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:358 state:D stack:0 pid:5060 tgid:5060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb605d84 r8:00000002 r7:60000113 r6:eb605d8c r5:854bc800 r4:854bc800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854bc800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb605e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9240 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb615000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545eb8c r4:8545e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545eb8c r4:85492b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854bc800 r8:85492bac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb605fb0 to 0xeb605ff8) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800d0113 r4:80239bb0 r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:359:5061 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:359 state:D stack:0 pid:5061 tgid:5061 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb60dd84 r8:00000002 r7:60000113 r6:eb60dd8c r5:854bd400 r4:854bd400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854bd400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb60f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545e78c r4:8545e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545e78c r4:85492e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854bd400 r8:85492eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85492e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85492e80 r8:80287e08 r7:eb605e60 r6:85492d00 r5:854bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb60dfb0 to 0xeb60dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a9080 INFO: task kworker/0:359:5061 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 84f6f000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r4:849a8000 Exception stack(0xe0029fb0 to 0xe0029ff8) r4:8462f100 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:854be000 r8:85431eac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:361:5065 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:854bec00 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:854bec00 r8:85492f2c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a9200 INFO: task kworker/0:361:5065 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 858f2000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:854b9800 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:854b9800 r8:854ae12c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 85e24000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:363:5070 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:363 state:D stack:0 pid:5070 tgid:5070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb635d84 r8:00000002 r7:60000013 r6:eb635d8c r5:84abec00 r5:84abec00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9800 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545fb8c r4:8545f800 r10:61c88647 r9:84abec00 r8:854ae02c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 86449000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:364:5071 blocked for more than 468 seconds. r10:8291a684 r9:eb641d84 r8:00000002 r7:60000013 r6:eb641d8c r5:84820000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9b80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb641fb0 to 0xeb641ff8) r4:854a97c0 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:365:5072 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:365 state:D stack:0 pid:5072 tgid:5072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb62dd84 r8:00000002 r7:60000013 r6:eb62dd8c r5:84820c00 r4:84820c00 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84820c00 r8:854ae32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ae300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ae300 r8:80287e08 r7:eb641e60 r6:854ae380 r5:84820c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb62dfb0 to 0xeb62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a97c0 INFO: task kworker/0:365:5072 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:800d0113 r4:80239bb0 r4:e0029dc0 r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0029fb0 to 0xe0029ff8) INFO: task kworker/0:366:5075 blocked for more than 468 seconds. [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84821800 r8:854ae42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ae400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ae400 r8:80287e08 r7:eb641e60 r6:854ae480 r5:84821800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb649fb0 to 0xeb649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a9ac0 INFO: task kworker/0:366:5075 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 86c75000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:367:5077 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:367 state:D stack:0 pid:5077 tgid:5077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb451d84 r8:00000002 r7:60000013 r6:eb451d8c r5:84822400 r4:84822400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84822400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb451e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9e80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546cb8c r4:8546c800 r7:dddced80 r6:83018000 r5:8546cb8c r4:854ae500 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:368:5079 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:368 state:D stack:0 pid:5079 tgid:5079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb479d84 r8:00000002 r7:60000013 r6:eb479d8c r5:84823000 r4:84823000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84823000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb479e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549ae80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84823000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8546cf8c r4:8546cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:854ae600 r8:80287e08 r7:eb451e60 r6:854ae700 r5:84823000 r4:8549af40 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:369:5082 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:369 state:D stack:0 pid:5082 tgid:5082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb505d84 r8:00000002 r7:60000013 r6:eb505d8c r5:84823c00 r4:84823c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84823c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb505e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f61c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84823c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaccb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546d78c r4:8546d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546d78c r4:854ae780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84823c00 r8:854ae7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ae780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ae780 r8:80287e08 r7:eb479e60 r6:854ae880 r5:84823c00 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 87876000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:8462f100 Workqueue: events bpf_prog_free_deferred r5:84824800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f6000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84824800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546d38c r4:8546d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546d38c r4:854ae680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84824800 r8:854ae6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ae680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ae680 r8:80287e08 r7:eb505e60 r6:854ae980 r5:84824800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb539fb0 to 0xeb539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f62c0 INFO: task kworker/0:370:5083 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe0029d28 to 0xe0029d70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb519d84 r8:00000002 r7:60000013 r6:eb519d8c r5:84825400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f6380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84825400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead55000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546db8c r4:8546d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546db8c r4:854ae800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84825400 r8:854ae82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ae800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ae800 r8:80287e08 r7:eb505e60 r6:854aea80 r5:84825400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb519fb0 to 0xeb519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f6180 INFO: task kworker/0:371:5085 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 88347000 ed729000 00000001 80239b98 7f565000 00000001 9d60: 80230ad0 80239bb0 800d0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:372:5087 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:372 state:D stack:0 pid:5087 tgid:5087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb53dd84 r8:00000002 r7:60000113 r6:eb53dd8c r5:84826000 r4:84826000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84826000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f6700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84826000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8546e38c r4:8546e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854ae900 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r4:e0029dc0 r5:00001000 r4:dfe13000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:373:5088 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:373 state:D stack:0 pid:5088 tgid:5088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb54dd84 r8:00000002 r7:60000113 r6:eb54dd8c r5:84826c00 r4:84826c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84826c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f6500 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8546df8c r4:8546dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854aea00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r4:e0029dc0 r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:374:5091 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:374 state:D stack:0 pid:5091 tgid:5091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb655d84 r8:00000002 r7:60000013 r6:eb655d8c r5:854c8000 r4:854c8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854c8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f6cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb17d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546f38c r4:8546f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:854c8000 r8:854aec2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:375:5092 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:375 state:D stack:0 pid:5092 tgid:5092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb44dd84 r8:00000002 r7:60000113 r6:eb44dd8c r5:854c8c00 r4:854c8c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854c8c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f68c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546e78c r4:8546e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:854c8c00 r8:854aecac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f67c0 INFO: task kworker/0:375:5092 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 89339000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8546eb8c r4:8546e800 r7:dddced80 r6:83018000 r5:8546eb8c r4:854aee00 r10:00000000 r9:854aee00 r8:80287e08 r7:eb655e60 r6:854aef00 r5:854c9800 INFO: task kworker/0:376:5095 is blocked on a mutex likely owned by task kworker/0:86:3596. 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:377:5096 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:377 state:D stack:0 pid:5096 tgid:5096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb65dd84 r8:00000002 r7:60000113 r6:eb65dd8c r5:854ca400 r4:854ca400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854ca400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f6b40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb13b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546ef8c r4:8546ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546ef8c r4:85503000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854ca400 r8:8550302c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85503000 r8:80287e08 r7:eb655e60 r6:85503080 r5:854ca400 r4:854f6c40 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 INFO: task kworker/0:378:5099 blocked for more than 468 seconds. r4:854cb000 r4:00000000 r9:83018005 r8:854cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 r7:dddced80 r6:83018000 r5:8546f78c r4:85503100 r10:00000000 r9:85503100 r8:80287e08 r7:eb655e60 r6:85503200 r5:854cb000 r4:854f6c80 Call trace: 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:379:5100 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:379 state:D stack:0 pid:5100 tgid:5100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb665d84 r8:00000002 r7:60000113 r6:eb665d8c r5:854cc800 r4:854cc800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854cc800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550a040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546fb8c r4:8546f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546fb8c r4:85503280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85503280 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:380:5103 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:380 state:D stack:0 pid:5103 tgid:5103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb66dd84 r8:00000002 r7:60000013 r6:eb66dd8c r5:854cbc00 r4:854cbc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854cbc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550a7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8556cf8c r4:8556cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:00001000 r4:dfe13000 r4:849a8000 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:381:5104 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:381 state:D stack:0 pid:5104 tgid:5104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb671d84 r8:00000002 r7:60000013 r6:eb671d8c r5:853fc800 r4:853fc800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fc800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550a300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8546ff8c r4:8546fc00 r10:61c88647 r9:853fc800 r8:855033ac r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: r5:800d0113 r4:80239bb0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fa0: 00000000 00000000 00000000 00000000 r4:853fb000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8550a500 Exception stack(0xe0029d28 to 0xe0029d70) r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:383:5108 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:383 state:D stack:0 pid:5108 tgid:5108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:853fe000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb67de08 r5:8556c78c r4:8556c400 r10:61c88647 r9:853fe000 r8:855035ac r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: r5:800d0113 r4:80239bb0 r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Not tainted 6.15.0-rc7-syzkaller #0 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8556cb8c r4:8556c800 r10:00000000 r9:85503600 r8:80287e08 r7:eb66de60 r6:85429700 r5:853f8c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8550a600 INFO: task kworker/0:384:5111 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 8ba05000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 r5:84aebb8c r4:84aeb800 Exception stack(0xe0029fb0 to 0xe0029ff8) Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8556d78c r4:85503680 r4:85503680 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 8ba05000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:386 state:D stack:0 pid:5114 tgid:5114 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fd400 r8:8550372c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85503700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85503700 r8:80287e08 r7:eb68de60 r6:85429800 r5:853fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb695fb0 to 0xeb695ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:386:5114 is blocked on a mutex likely owned by task kworker/0:86:3596. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:eb4c3000 r5:8556db8c r4:8556d800 r10:00000000 r9:85503780 r8:80287e08 r7:eb68de60 r6:85503500 r5:854cd400 r4:8550aa00 INFO: task kworker/0:387:5117 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 8c49b000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:854cec00 r8:855038ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85503880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85503880 r8:80287e08 r7:eb669e60 r6:85503800 r5:854cec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb679fb0 to 0xeb679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8550aa00 INFO: task kworker/0:388:5119 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad0 80239bb0 800d0113 ffffffff [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:8556df8c r4:8556dc00 r10:61c88647 r9:854ce000 r8:8550392c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:390 state:D stack:0 pid:5122 tgid:5122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6a9d84 r8:00000002 r7:60000013 r6:eb6a9d8c r5:853fa400 r4:853fa400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fa400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550ae00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8556e38c r4:8556e000 r10:61c88647 r9:853fa400 r8:85503a2c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 9fa0: 00000000 00000000 00000000 00000000 r5:85400000 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551b040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:392:5126 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8556eb8c r4:8556e800 r10:00000000 r9:85503c00 r8:80287e08 r7:eb679e60 r6:85503c80 r5:854d8000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8551b280 INFO: task kworker/0:392:5126 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 8d5f5000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551b5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85400c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb533000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556f78c r4:8556f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556f78c r4:85503b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85400c00 r8:85503bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85503b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85503b80 r8:80287e08 r7:eb679e60 r6:85429980 r5:85400c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c1fb0 to 0xeb6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:393:5129 is blocked on a mutex likely owned by task kworker/0:86:3596. 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r4:e0029dc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:394:5130 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:394 state:D stack:0 pid:5130 tgid:5130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r5:00001000 r4:eb527000 r5:8556f38c r4:8556f000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029d28 to 0xe0029d70) r4:e0029dc0 r5:84aebb8c r4:84aeb800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:5133 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:5133 tgid:5133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6d1d84 r8:00000002 r7:60000113 r6:eb6d1d8c r5:85401800 r4:85401800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:8556fb8c r4:8556f800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 Exception stack(0xe0029fb0 to 0xe0029ff8) INFO: task kworker/0:396:5135 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:5135 tgid:5135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6d9d84 r8:00000002 r7:60000113 r6:eb6d9d8c r5:85404800 r4:85404800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85404800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855047c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85404800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85503e80 r8:80287e08 r7:eb6d1e60 r6:85429b00 r5:85404800 Exception stack(0xe0029d28 to 0xe0029d70) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85403c00 r4:8291a680 r9:83018005 r8:85403c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 r10:00000000 r9:85503f00 r8:80287e08 r7:eb6d9e60 r6:85429b80 r5:85403c00 r4:00000000 r4:82ac21e4 r5:00001000 r4:dfe13000 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:5138 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:5138 tgid:5138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6e9d84 r8:00000002 r7:60000113 r6:eb6e9d8c r5:85403000 r4:85403000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85403000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551b900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85403000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb651000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8557038c r4:85570000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f5e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557078c r4:85570400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557078c r4:85503f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854da400 r8:85503fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85503f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85503f80 r8:80287e08 r7:eb6d9e60 r6:85503a80 r5:854da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f5fb0 to 0xeb6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8551be40 INFO: task kworker/0:399:5146 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 8f107000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:854db000 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:854db000 r8:854aeeac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6fdd84 r8:00000002 r7:60000113 r6:eb6fdd8c r5:854dbc00 r4:854dbc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854dbc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6fde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf93000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85570f8c r4:85570c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85570f8c r4:849c8e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854dbc00 r8:849c8eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c8e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c8e80 r8:80287e08 r7:eb6d9e60 r6:8552b000 r5:854dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6fdfb0 to 0xeb6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8551be40 INFO: task kworker/0:401:5148 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 8faa2000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 INFO: task kworker/1:607:5149 blocked for more than 469 seconds. r5:85406c00 r4:8291a680 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8427cb8c r4:8427c800 r10:61c88647 r9:85406c00 r8:85429cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b0f8c r4:855b0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855b0f8c r4:8552b080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d8c00 r8:8552b0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8552b080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552b080 r8:80287e08 r7:eb6d9e60 r6:8552b200 r5:854d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b1fb0 to 0xeb6b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85527000 INFO: task kworker/0:402:5152 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 904bc000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:854dc800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85533380 r5:855ac38c r4:855ac000 r10:61c88647 r9:854dc800 r8:85429e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:854de000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb70de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb70dfb0 to 0xeb70dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85533500 INFO: task kworker/1:609:5156 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 908ae000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:610:5158 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:610 state:D stack:0 pid:5158 tgid:5158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb715d84 r8:00000002 r7:60000113 r6:eb715d8c r5:854dd400 r4:854dd400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854dd400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb715e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018205 r8:854dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:855b0b8c r4:855b0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8552f180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f180 r8:80287e08 r7:eb70de60 r6:8552b280 r5:854dd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb715fb0 to 0xeb715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855335c0 INFO: task kworker/1:610:5158 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 90c0e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:611:5159 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:611 state:D stack:0 pid:5159 tgid:5159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:854d9800 r5:854d9800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb719e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:854d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:855acf8c r4:855acc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855acf8c r4:8552f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8552f000 r10:00000000 r9:8552f000 r8:80287e08 r7:eb715e60 r6:8552b300 r5:854d9800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:855335c0 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0029d28 to 0xe0029d70) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:00000000 r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:612:5161 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:612 state:D stack:0 pid:5161 tgid:5161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb721d84 r8:00000002 r7:60000013 r6:eb721d8c r5:848f0c00 r4:848f0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848f0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85533700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ad38c r4:855ad000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855ad38c r4:8552f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848f0c00 r8:8552f22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552f200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f200 r8:80287e08 r7:eb715e60 r6:8552b380 r5:848f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb721fb0 to 0xeb721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85533700 INFO: task kworker/1:612:5161 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9150d000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:613:5163 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:613 state:D stack:0 pid:5163 tgid:5163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb729d84 r8:00000002 r7:60000113 r6:eb729d8c r5:848f0000 r4:848f0000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848f0000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb729e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85533a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ad78c r4:855ad400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855ad78c r4:8552f080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848f0000 r8:8552f0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552f080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f080 r8:80287e08 r7:eb715e60 r6:8552b400 r5:848f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb729fb0 to 0xeb729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85533900 INFO: task kworker/1:613:5163 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 91b7a000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:849a8000 r4:00000001 Exception stack(0xe0029fb0 to 0xe0029ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb731d84 r8:00000002 r7:60000113 r6:eb731d8c r5:848f1800 r4:848f1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848f1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb731e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85533ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855adb8c r4:855ad800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855adb8c r4:8552f300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848f1800 r8:8552f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552f300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f300 r8:80287e08 r7:eb715e60 r6:8552b480 r5:848f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb731fb0 to 0xeb731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85533c80 INFO: task kworker/1:614:5165 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 91eb8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:615:5167 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:615 state:D stack:0 pid:5167 tgid:5167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb739d84 r8:00000002 r7:60000113 r6:eb739d8c r5:848f2400 r4:848f2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848f2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb739e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85533bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb221000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855adf8c r4:855adc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855adf8c r4:8552f280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848f2400 r8:8552f2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552f280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f280 r8:80287e08 r7:eb715e60 r6:8552b500 r5:848f2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb739fb0 to 0xeb739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85533d80 INFO: task kworker/1:615:5167 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 92509000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:616:5169 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:616 state:D stack:0 pid:5169 tgid:5169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb741d84 r8:00000002 r7:60000113 r6:eb741d8c r5:848f3000 r4:848f3000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848f3000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb741e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85533e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb257000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ae38c r4:855ae000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855ae38c r4:8552f380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848f3000 r8:8552f3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552f380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f380 r8:80287e08 r7:eb715e60 r6:8552b580 r5:848f3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb741fb0 to 0xeb741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85533c00 INFO: task kworker/1:616:5169 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 92509000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:617:5171 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:617 state:D stack:0 pid:5171 tgid:5171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb749d84 r8:00000002 r7:60000113 r6:eb749d8c r5:848f3c00 r4:848f3c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848f3c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb749e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551bb80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb275000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ae78c r4:855ae400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855ae78c r4:8552f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848f3c00 r8:8552f42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552f400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f400 r8:80287e08 r7:eb715e60 r6:8552b600 r5:848f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb749fb0 to 0xeb749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85533ec0 INFO: task kworker/1:617:5171 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 92b86000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:618:5173 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:618 state:D stack:0 pid:5173 tgid:5173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb751d84 r8:00000002 r7:60000113 r6:eb751d8c r5:848f4800 r4:848f4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848f4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85533f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855aeb8c r4:855ae800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855aeb8c r4:8552f500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848f4800 r8:8552f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552f500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f500 r8:80287e08 r7:eb715e60 r6:8552b680 r5:848f4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb751fb0 to 0xeb751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8551bd00 INFO: task kworker/1:618:5173 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 92e45000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:619:5175 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:619 state:D stack:0 pid:5175 tgid:5175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:848f6c00 r4:8291a680 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855aef8c r4:855aec00 r7:ddde2d80 r6:83018200 r5:855aef8c r4:8552f580 r4:8552f580 r10:00000000 r9:8552f580 r8:80287e08 r7:eb715e60 r6:8552b700 r5:848f6c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 936e9000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:620:5177 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:620 state:D stack:0 pid:5177 tgid:5177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb761d84 r8:00000002 r7:60000113 r6:eb761d8c r5:848f6000 r4:848f6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848f6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550d200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855af38c r4:855af000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855af38c r4:8552f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848f6000 r8:8552f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552f100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f100 r8:80287e08 r7:eb715e60 r6:8552b780 r5:848f6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85533ec0 INFO: task kworker/1:620:5177 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 936e9000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:621:5179 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:621 state:D stack:0 pid:5179 tgid:5179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb769d84 r8:00000002 r7:60000113 r6:eb769d8c r5:854e0000 r4:854e0000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854e0000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb769e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb41f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855af78c r4:855af400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855af78c r4:8552f600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854e0000 r8:8552f62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552f600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f600 r8:80287e08 r7:eb715e60 r6:8552b800 r5:854e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb769fb0 to 0xeb769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8550d000 INFO: task kworker/1:621:5179 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 93aff000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:622:5181 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:622 state:D stack:0 pid:5181 tgid:5181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb771d84 r8:00000002 r7:60000113 r6:eb771d8c r5:854e1800 r4:854e1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854e1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb771e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855afb8c r4:855af800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855afb8c r4:8552f780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854e1800 r8:8552f7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552f780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f780 r8:80287e08 r7:eb715e60 r6:8552b880 r5:854e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb771fb0 to 0xeb771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85518240 INFO: task kworker/1:622:5181 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 93d08000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:623:5183 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:623 state:D stack:0 pid:5183 tgid:5183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb779d84 r8:00000002 r7:60000113 r6:eb779d8c r5:854e3000 r4:854e3000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854e3000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb779e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855181c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb583000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855aff8c r4:855afc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855aff8c r4:8552f700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854e3000 r8:8552f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552f700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f700 r8:80287e08 r7:eb715e60 r6:8552b900 r5:854e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb779fb0 to 0xeb779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85518100 INFO: task kworker/1:623:5183 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 94229000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:624:5185 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:624 state:D stack:0 pid:5185 tgid:5185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb781d84 r8:00000002 r7:60000113 r6:eb781d8c r5:854e2400 r4:854e2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854e2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb595000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b038c r4:855b0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b038c r4:8552f800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854e2400 r8:8552f82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552f800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f800 r8:80287e08 r7:eb715e60 r6:8552b980 r5:854e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb781fb0 to 0xeb781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85518200 INFO: task kworker/1:624:5185 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 94661000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:625:5187 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:625 state:D stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb789d84 r8:00000002 r7:60000013 r6:eb789d8c r5:854e0c00 r4:854e0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854e0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb789e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b078c r4:855b0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b078c r4:8552f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854e0c00 r8:8552f4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552f480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f480 r8:80287e08 r7:eb715e60 r6:8552ba00 r5:854e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb789fb0 to 0xeb789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85518340 INFO: task kworker/1:625:5187 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 94a4c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:626:5189 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:626 state:D stack:0 pid:5189 tgid:5189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb791d84 r8:00000002 r7:60000113 r6:eb791d8c r5:854e5400 r4:854e5400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854e5400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb791e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518d80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7ab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b1f8c r4:855b1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b1f8c r4:8552f900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854e5400 r8:8552f92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552f900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f900 r8:80287e08 r7:eb715e60 r6:8552ba80 r5:854e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb791fb0 to 0xeb791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85518480 INFO: task kworker/1:626:5189 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9521c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:627:5191 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:627 state:D stack:0 pid:5191 tgid:5191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb795d84 r8:00000002 r7:60000113 r6:eb795d8c r5:854e3c00 r4:854e3c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854e3c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb795e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb627000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b138c r4:855b1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b138c r4:8552fa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854e3c00 r8:8552fa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552fa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552fa00 r8:80287e08 r7:eb791e60 r6:8552bb00 r5:854e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb795fb0 to 0xeb795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855188c0 INFO: task kworker/1:627:5191 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9521c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:628:5194 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:628 state:D stack:0 pid:5194 tgid:5194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb79dd84 r8:00000002 r7:60000013 r6:eb79dd8c r5:854e4800 r4:854e4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854e4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb79de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb639000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b178c r4:855b1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b178c r4:8552f880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854e4800 r8:8552f8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552f880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f880 r8:80287e08 r7:eb791e60 r6:8552bb80 r5:854e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb79dfb0 to 0xeb79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85518940 INFO: task kworker/1:628:5194 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 95667000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:629:5196 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:629 state:D stack:0 pid:5196 tgid:5196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7a5d84 r8:00000002 r7:60000113 r6:eb7a5d8c r5:854e6c00 r4:854e6c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854e6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb645000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b1b8c r4:855b1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b1b8c r4:8552f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854e6c00 r8:8552f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552f980 r8:80287e08 r7:eb791e60 r6:8552bc00 r5:854e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a5fb0 to 0xeb7a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85518a00 INFO: task kworker/1:629:5196 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 95667000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:630:5198 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:630 state:D stack:0 pid:5198 tgid:5198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7b1d84 r8:00000002 r7:60000113 r6:eb7b1d8c r5:854e6000 r4:854e6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854e6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b2b8c r4:855b2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b2b8c r4:8552fa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854e6000 r8:8552faac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552fa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552fa80 r8:80287e08 r7:eb791e60 r6:8552bc80 r5:854e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b1fb0 to 0xeb7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85518cc0 INFO: task kworker/1:630:5198 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 95a65000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:403:5200 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:403 state:D stack:0 pid:5200 tgid:5200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7bdd84 r8:00000002 r7:60000113 r6:eb7bdd8c r5:84500000 r4:84500000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84500000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7bde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f1880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84500000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb347000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b578c r4:855b5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855b578c r4:8552bd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84500000 r8:8552bd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8552bd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552bd00 r8:80287e08 r7:eb6d9e60 r6:8552bd80 r5:84500000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7bdfb0 to 0xeb7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85504980 INFO: task kworker/0:403:5200 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 95a65000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:631:5201 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:631 state:D stack:0 pid:5201 tgid:5201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7c5d84 r8:00000002 r7:60000113 r6:eb7c5d8c r5:84500c00 r4:84500c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84500c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84500c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b238c r4:855b2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b238c r4:8552fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84500c00 r8:8552fc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552fc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552fc00 r8:80287e08 r7:eb7b1e60 r6:8552be00 r5:84500c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c5fb0 to 0xeb7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85518d40 INFO: task kworker/1:631:5201 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 95ffa000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:632:5203 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:632 state:D stack:0 pid:5203 tgid:5203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7cdd84 r8:00000002 r7:60000013 r6:eb7cdd8c r5:84502400 r4:84502400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84502400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7cde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84502400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7cf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b278c r4:855b2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b278c r4:8552fb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84502400 r8:8552fb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552fb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552fb00 r8:80287e08 r7:eb7b1e60 r6:8552be80 r5:84502400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7cdfb0 to 0xeb7cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85518e40 INFO: task kworker/1:632:5203 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 95ffa000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:633:5205 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:633 state:D stack:0 pid:5205 tgid:5205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb681d84 r8:00000002 r7:60000113 r6:eb681d8c r5:84501800 r4:84501800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84501800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb681e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f1340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84501800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b3f8c r4:855b3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b3f8c r4:8552fc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84501800 r8:8552fcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552fc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552fc80 r8:80287e08 r7:eb7b1e60 r6:8552bf00 r5:84501800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb681fb0 to 0xeb681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85527280 INFO: task kworker/1:633:5205 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 96388000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:634:5207 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:634 state:D stack:0 pid:5207 tgid:5207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6c9d84 r8:00000002 r7:60000013 r6:eb6c9d8c r5:84504800 r4:84504800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84504800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84504800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b2f8c r4:855b2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b2f8c r4:8552fb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84504800 r8:8552fbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552fb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552fb80 r8:80287e08 r7:eb681e60 r6:8552bf80 r5:84504800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c9fb0 to 0xeb6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85527d80 INFO: task kworker/1:634:5207 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 96c84000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:635:5209 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:635 state:D stack:0 pid:5209 tgid:5209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7e5d84 r8:00000002 r7:60000113 r6:eb7e5d8c r5:84505400 r4:84505400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84505400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f1040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84505400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd93000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b338c r4:855b3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b338c r4:8552fd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84505400 r8:8552fd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552fd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552fd00 r8:80287e08 r7:eb681e60 r6:854b4000 r5:84505400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e5fb0 to 0xeb7e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85527bc0 INFO: task kworker/1:635:5209 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 96c84000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:636:5211 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:636 state:D stack:0 pid:5211 tgid:5211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7edd84 r8:00000002 r7:60000113 r6:eb7edd8c r5:84506000 r4:84506000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84506000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f11c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84506000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b378c r4:855b3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b378c r4:8552fe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84506000 r8:8552fe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552fe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552fe00 r8:80287e08 r7:eb681e60 r6:854b4080 r5:84506000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7edfb0 to 0xeb7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f1080 INFO: task kworker/1:636:5211 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 970d2000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:637:5214 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:637 state:D stack:0 pid:5214 tgid:5214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7f9d84 r8:00000002 r7:60000113 r6:eb7f9d8c r5:84503c00 r4:84503c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84503c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f1240 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84503c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b3b8c r4:855b3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b3b8c r4:8552fe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84503c00 r8:8552feac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552fe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552fe80 r8:80287e08 r7:eb681e60 r6:854b4100 r5:84503c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f9fb0 to 0xeb7f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f1180 INFO: task kworker/1:637:5214 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 970d2000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:638:5217 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:638 state:D stack:0 pid:5217 tgid:5217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7f5d84 r8:00000002 r7:60000013 r6:eb7f5d8c r5:85405400 r4:85405400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85405400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f1500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85405400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b438c r4:855b4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b438c r4:8552fd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85405400 r8:8552fdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552fd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552fd80 r8:80287e08 r7:eb681e60 r6:8552f680 r5:85405400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f5fb0 to 0xeb7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f1380 INFO: task kworker/1:638:5217 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 97635000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:639:5218 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:639 state:D stack:0 pid:5218 tgid:5218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7fdd84 r8:00000002 r7:60000113 r6:eb7fdd8c r5:853fbc00 r4:853fbc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fbc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7fde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f1b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb195000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b4f8c r4:855b4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b4f8c r4:8552ff80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fbc00 r8:8552ffac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8552ff80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552ff80 r8:80287e08 r7:eb7f5e60 r6:8552ff00 r5:853fbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7fdfb0 to 0xeb7fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f1440 INFO: task kworker/1:639:5218 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 97635000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:640:5219 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:640 state:D stack:0 pid:5219 tgid:5219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb701d84 r8:00000002 r7:60000113 r6:eb701d8c r5:853f0c00 r4:853f0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb701e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f17c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b478c r4:855b4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b478c r4:85429f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f0c00 r8:85429fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85429f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85429f80 r8:80287e08 r7:eb7fde60 r6:85429d00 r5:853f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb701fb0 to 0xeb701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f1440 INFO: task kworker/1:640:5219 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 97ecb000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:641:5222 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:641 state:D stack:0 pid:5222 tgid:5222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb805d84 r8:00000002 r7:60000113 r6:eb805d8c r5:85408000 r4:85408000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85408000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb805e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f1b40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85408000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb163000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b4b8c r4:855b4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b4b8c r4:854a7100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85408000 r8:854a712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854a7100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a7100 r8:80287e08 r7:eb7fde60 r6:854a7180 r5:85408000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb805fb0 to 0xeb805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f1ac0 INFO: task kworker/1:641:5222 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 985a2000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:642:5225 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:642 state:D stack:0 pid:5225 tgid:5225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb801d84 r8:00000002 r7:60000113 r6:eb801d8c r5:85409800 r4:85409800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85409800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb801e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85409800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b5b8c r4:855b5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b5b8c r4:854a7000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85409800 r8:854a702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854a7000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a7000 r8:80287e08 r7:eb7fde60 r6:854a7280 r5:85409800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb801fb0 to 0xeb801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f1c80 INFO: task kworker/1:642:5225 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 98b86000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:404:5226 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:404 state:D stack:0 pid:5226 tgid:5226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb80dd84 r8:00000002 r7:60000113 r6:eb80dd8c r5:8540b000 r4:8540b000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb80de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84749680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8540b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557178c r4:85571400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557178c r4:854b4180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540b000 r8:854b41ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b4180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b4180 r8:80287e08 r7:eb7bde60 r6:854a7080 r5:8540b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb80dfb0 to 0xeb80dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85504ec0 INFO: task kworker/0:404:5226 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9914c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:643:5228 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:643 state:D stack:0 pid:5228 tgid:5228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb811d84 r8:00000002 r7:60000113 r6:eb811d8c r5:8540bc00 r4:8540bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb811e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8540bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb471000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b5f8c r4:855b5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b5f8c r4:854a7380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540bc00 r8:854a73ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854a7380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a7380 r8:80287e08 r7:eb801e60 r6:854a7200 r5:8540bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb811fb0 to 0xeb811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f1e80 INFO: task kworker/1:643:5228 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 99532000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:405:5231 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:405 state:D stack:0 pid:5231 tgid:5231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb819d84 r8:00000002 r7:60000113 r6:eb819d8c r5:8540a400 r4:8540a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb819e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547f700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8540a400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557278c r4:85572400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557278c r4:854b4300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540a400 r8:854b432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b4300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b4300 r8:80287e08 r7:eb7bde60 r6:854a7300 r5:8540a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb819fb0 to 0xeb819ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: 9d20: 99532000 ed729000 00000001 80239b98 7f565000 00000001 r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b6b80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85504000 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r5:84aebb8c r4:84aeb800 r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:644:5235 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:644 state:D stack:0 pid:5235 tgid:5235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb821d84 r8:00000002 r7:60000113 r6:eb821d8c r5:848f5400 r4:848f5400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848f5400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb821e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b638c r4:855b6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b638c r4:854a7580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848f5400 r8:854a75ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854a7580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a7580 r8:80287e08 r7:eb811e60 r6:854b4200 r5:848f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb821fb0 to 0xeb821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854af1c0 INFO: task kworker/1:644:5235 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 99ba2000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:645:5237 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:645 state:D stack:0 pid:5237 tgid:5237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb82dd84 r8:00000002 r7:60000113 r6:eb82dd8c r5:84503000 r4:84503000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84503000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af480 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84503000 r8:854a762c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:8462f100 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af5c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0029d28 to 0xe0029d70) 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:647:5241 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:647 state:D stack:0 pid:5241 tgid:5241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb839d84 r8:00000002 r7:60000013 r6:eb839d8c r5:84920c00 r4:84920c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84920c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb839e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84920c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb51d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b738c r4:855b7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b738c r4:854a7680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84920c00 r8:854a76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:854a7680 r8:80287e08 r7:eb831e60 r6:854b4480 r5:84920c00 r4:854af500 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:8462f100 task:kworker/1:648 state:D stack:0 pid:5242 tgid:5242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb83dd84 r8:00000002 r7:60000113 r6:eb83dd8c r5:84921800 r4:84921800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84921800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb83de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84921800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb509000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b6f8c r4:855b6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b6f8c r4:854a7780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84921800 r8:854a77ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854a7780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a7780 r8:80287e08 r7:eb839e60 r6:854b4500 r5:84921800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb83dfb0 to 0xeb83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:854af800 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:649:5244 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:649 state:D stack:0 pid:5244 tgid:5244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb845d84 r8:00000002 r7:60000013 r6:eb845d8c r5:84923000 r4:84923000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84923000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb845e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:854a7800 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:849a8000 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:650:5246 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:650 state:D stack:0 pid:5246 tgid:5246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb84dd84 r8:00000002 r7:60000013 r6:eb84dd8c r5:84922400 r4:84922400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84922400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb84de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854afa00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84922400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb545000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b778c r4:855b7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b778c r4:854a7400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84922400 r8:854a742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854a7400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a7400 r8:80287e08 r7:eb845e60 r6:854b4600 r5:84922400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb84dfb0 to 0xeb84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854af840 INFO: task kworker/1:650:5246 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d20: 9a780000 ed729000 00000001 80239b98 7f565000 00000001 r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:651 state:D stack:0 pid:5248 tgid:5248 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb851e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 INFO: task kworker/0:407:5250 blocked for more than 471 seconds. r4:84926000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84926000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb855e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85504d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84926000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85571f8c r4:85571c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85571f8c r4:854b4700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84926000 r8:854b472c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b4700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b4700 r8:80287e08 r7:eb819e60 r6:854b4880 r5:84926000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb855fb0 to 0xeb855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b6b40 INFO: task kworker/0:407:5250 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9ac16000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548e300 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:855bd38c r4:854a7980 r10:61c88647 r9:84920000 r8:854a79ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854a7980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a7980 r8:80287e08 r7:eb845e60 r6:854b4780 r5:84920000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb861fb0 to 0xeb861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854afb40 INFO: task kworker/1:652:5253 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9adde000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:653:5254 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:653 state:D stack:0 pid:5254 tgid:5254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb865d84 r8:00000002 r7:60000113 r6:eb865d8c r5:84926c00 r4:84926c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84926c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb865e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855bc38c r4:855bc000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb865fb0 to 0xeb865ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:82ac21e4 r4:e0029dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:654:5256 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:654 state:D stack:0 pid:5256 tgid:5256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb86dd84 r8:00000002 r7:60000113 r6:eb86dd8c r5:854dec00 r4:854dec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854dec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb86de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84749740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855bc78c r4:855bc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855bc78c r4:854a7a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854dec00 r8:854a7aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854a7a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a7a80 r8:80287e08 r7:eb861e60 r6:854b4900 r5:854dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb86dfb0 to 0xeb86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854afd80 INFO: task kworker/1:654:5256 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9b54e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:655:5258 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:655 state:D stack:0 pid:5258 tgid:5258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb879d84 r8:00000002 r7:60000113 r6:eb879d8c r5:855e8c00 r4:855e8c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e8c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb879e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548e040 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855bcb8c r4:855bc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855bcb8c r4:854a7a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e8c00 r8:854a7a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854a7a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a7a00 r8:80287e08 r7:eb861e60 r6:854b4980 r5:855e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb879fb0 to 0xeb879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8548e000 INFO: task kworker/1:655:5258 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9b9ab000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:656:5260 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:656 state:D stack:0 pid:5260 tgid:5260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb881d84 r8:00000002 r7:60000113 r6:eb881d8c r5:855e9800 r4:855e9800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e9800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb881e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548e180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855bcf8c r4:855bcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855bcf8c r4:854a7b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e9800 r8:854a7b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854a7b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a7b00 r8:80287e08 r7:eb861e60 r6:854b4a00 r5:855e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb881fb0 to 0xeb881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8548e280 INFO: task kworker/1:656:5260 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9baa7000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:657:5262 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:657 state:D stack:0 pid:5262 tgid:5262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb889d84 r8:00000002 r7:60000013 r6:eb889d8c r5:855e8000 r4:855e8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb889e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb8b3000 r5:855bdf8c r4:855bdc00 r10:61c88647 r9:855e8000 r8:854a7c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:855ebc00 r4:8291a680 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548e440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb891000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855bd78c r4:855bd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855bd78c r4:854a7b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ebc00 r8:854a7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854a7b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a7b80 r8:80287e08 r7:eb889e60 r6:854b4b00 r5:855ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb89dfb0 to 0xeb89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8548e2c0 INFO: task kworker/1:658:5264 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9c0e2000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:855ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:855bdb8c r4:855bd800 r10:61c88647 r9:855ec800 r8:854a7cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:e0029dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe0029fb0 to 0xe0029ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:855eb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb849e08 r9:83018005 r8:855eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb849fb0 to 0xeb849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85504cc0 INFO: task kworker/0:408:5269 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9c6e2000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:660:5271 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:660 state:D stack:0 pid:5271 tgid:5271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8bdd84 r8:00000002 r7:60000013 r6:eb8bdd8c r5:855ed400 r4:855ed400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ed400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8bde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548e9c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855be78c r4:855be400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855be78c r4:854a7d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ed400 r8:854a7dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 Exception stack(0xe0029fb0 to 0xe0029ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb8c9d84 r8:00000002 r7:60000113 r6:eb8c9d8c r5:855eec00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548e880 r5:855be38c r4:855be000 r10:61c88647 r9:855eec00 r8:854a7e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:662:5275 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:662 state:D stack:0 pid:5275 tgid:5275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8ddd84 r8:00000002 r7:60000113 r6:eb8ddd8c r5:855ee000 r4:855ee000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ee000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8dde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548ec40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855bef8c r4:855bec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855bef8c r4:854a7e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ee000 r8:854a7eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854a7e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a7e80 r8:80287e08 r7:eb8bde60 r6:854b4e00 r5:855ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8ddfb0 to 0xeb8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8548e900 INFO: task kworker/1:662:5275 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:800d0113 r4:80239bb0 r4:e0029dc0 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 Exception stack(0xe0029fb0 to 0xe0029ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8540e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548ea40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8540e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855beb8c r4:855be800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855beb8c r4:854a7700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540e000 r8:854a772c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854a7700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a7700 r8:80287e08 r7:eb8dde60 r6:854a7f00 r5:8540e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a1fb0 to 0xeb8a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8548e900 INFO: task kworker/1:663:5276 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9cf65000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85408c00 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85572b8c r4:85572800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85408c00 r8:8543b02c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8543b000 r8:80287e08 r7:eb849e60 r6:8548a000 r5:85408c00 5fa0: 00000000 00000000 00000000 00000000 r4:8547f880 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0029d28 to 0xe0029d70) 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:664:5284 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:664 state:D stack:0 pid:5284 tgid:5284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8edd84 r8:00000002 r7:60000013 r6:eb8edd8c r5:8540ec00 r4:8540ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548ecc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8540ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e008b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855bf38c r4:855bf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855bf38c r4:8548a180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540ec00 r8:8548a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8548a180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548a180 r8:80287e08 r7:eb8dde60 r6:8548a080 r5:8540ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8edfb0 to 0xeb8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8548edc0 INFO: task kworker/1:664:5284 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9da2f000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:665:5285 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:665 state:D stack:0 pid:5285 tgid:5285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8f1d84 r8:00000002 r7:60000113 r6:eb8f1d8c r5:85406000 r4:85406000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85406000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854aa100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85406000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855bff8c r4:855bfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855bff8c r4:8548a100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85406000 r8:8548a12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8548a100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548a100 r8:80287e08 r7:eb8ede60 r6:8548a200 r5:85406000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f1fb0 to 0xeb8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8548edc0 INFO: task kworker/1:665:5285 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9db4d000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:410:5286 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:410 state:D stack:0 pid:5286 tgid:5286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8f5d84 r8:00000002 r7:60000013 r6:eb8f5d8c r5:85410000 r4:85410000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85410000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547fb40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85410000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafcf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557338c r4:85573000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557338c r4:8543b100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85410000 r8:8543b12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543b100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b100 r8:80287e08 r7:eb849e60 r6:8548a280 r5:85410000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f5fb0 to 0xeb8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547f840 INFO: task kworker/0:410:5286 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9dfea000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:5289 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:411 state:D stack:0 pid:5289 tgid:5289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8f9d84 r8:00000002 r7:60000013 r6:eb8f9d8c r5:85410c00 r4:85410c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85410c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547f380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85410c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8478eb8c r4:8478e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8478eb8c r4:8543b180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85410c00 r8:8543b1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543b180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b180 r8:80287e08 r7:eb8f5e60 r6:8548a380 r5:85410c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f9fb0 to 0xeb8f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547fac0 INFO: task kworker/0:411:5289 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9e0c3000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:666:5290 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:666 state:D stack:0 pid:5290 tgid:5290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8fdd84 r8:00000002 r7:60000113 r6:eb8fdd8c r5:85411800 r4:85411800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85411800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854aa080 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85411800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855bfb8c r4:855bf800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855bfb8c r4:8548a300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85411800 r8:8548a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8548a300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8548a300 r8:80287e08 r7:eb8f1e60 r6:8548a400 r5:85411800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8fdfb0 to 0xeb8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84749780 INFO: task kworker/1:666:5290 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9e48d000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:412:5291 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:412 state:D stack:0 pid:5291 tgid:5291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb901d84 r8:00000002 r7:60000113 r6:eb901d8c r5:85412400 r4:85412400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85412400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb901e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547fd00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85412400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb039000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557378c r4:85573400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557378c r4:8543b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85412400 r8:8543b22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543b200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b200 r8:80287e08 r7:eb8f9e60 r6:8548a480 r5:85412400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb901fb0 to 0xeb901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547fac0 INFO: task kworker/0:412:5291 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9e74c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:413:5293 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:413 state:D stack:0 pid:5293 tgid:5293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb905d84 r8:00000002 r7:60000113 r6:eb905d8c r5:85413000 r4:85413000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85413000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb905e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547fe40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85413000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb083000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85573b8c r4:85573800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85573b8c r4:8543b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85413000 r8:8543b2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b280 r8:80287e08 r7:eb8f9e60 r6:8548a500 r5:85413000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb905fb0 to 0xeb905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547fa80 INFO: task kworker/0:413:5293 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9eabe000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:5296 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:5296 tgid:5296 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb911d84 r8:00000002 r7:60000113 r6:eb911d8c r5:85415400 r4:85415400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85415400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb911e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ff40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85415400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb197000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85573f8c r4:85573c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85573f8c r4:8543b380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85415400 r8:8543b3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543b380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b380 r8:80287e08 r7:eb8f9e60 r6:8548a580 r5:85415400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb911fb0 to 0xeb911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547fa80 INFO: task kworker/0:414:5296 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9eabe000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:415:5297 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:415 state:D stack:0 pid:5297 tgid:5297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb915d84 r8:00000002 r7:60000013 r6:eb915d8c r5:85413c00 r4:85413c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85413c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb915e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85413c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85594b8c r4:85594800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85594b8c r4:8543b300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85413c00 r8:8543b32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543b300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b300 r8:80287e08 r7:eb8f9e60 r6:8548a600 r5:85413c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb915fb0 to 0xeb915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547fa80 INFO: task kworker/0:415:5297 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9efe8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:416:5299 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:416 state:D stack:0 pid:5299 tgid:5299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85416c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb91de08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8478e78c r4:8478e400 r7:dddced80 r6:83018000 r5:8478e78c r4:8543b400 r10:61c88647 r9:85416c00 r8:8543b42c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8547fc40 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:417:5301 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:417 state:D stack:0 pid:5301 tgid:5301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb921d84 r8:00000002 r7:60000013 r6:eb921d8c r5:85414800 r4:85414800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85414800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb921e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85414800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb263000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559438c r4:85594000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559438c r4:8543b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85414800 r8:8543b52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543b500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b500 r8:80287e08 r7:eb915e60 r6:8548a700 r5:85414800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb921fb0 to 0xeb921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547f280 INFO: task kworker/0:417:5301 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9f61d000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:418:5303 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:eb919d84 r8:00000002 r7:60000013 r6:eb919d8c r5:84925400 r4:84925400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84925400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb919e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84925400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb383000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559478c r4:85594400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559478c r4:8543b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84925400 r8:8543b5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543b580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b580 r8:80287e08 r7:eb915e60 r6:8543b480 r5:84925400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb919fb0 to 0xeb919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85480240 INFO: task kworker/0:418:5303 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9f61d000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 9fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eb929d84 r8:00000002 r7:60000013 r6:eb929d8c r5:8540c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb929e08 r9:83018005 r8:8540c800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 r5:85594f8c r4:85594c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8543b600 r8:80287e08 r7:eb915e60 r6:8543b700 r5:8540c800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:420:5308 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:420 state:D stack:0 pid:5308 tgid:5308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8d5d84 r8:00000002 r7:60000013 r6:eb8d5d8c r5:84838000 r4:84838000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84838000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84838000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb593000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85595b8c r4:85595800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85595b8c r4:8543b080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84838000 r8:8543b0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543b080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b080 r8:80287e08 r7:eb929e60 r6:8543b800 r5:84838000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d5fb0 to 0xeb8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85480580 INFO: task kworker/0:420:5308 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9fef3000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:84839800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84839800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb565000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559538c r4:85595000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559538c r4:8543b680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84839800 r8:8543b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543b680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b680 r8:80287e08 r7:eb8d5e60 r6:8543b900 r5:84839800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb92dfb0 to 0xeb92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85480700 INFO: task kworker/0:421:5310 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: 9fef3000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:5311 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:5311 tgid:5311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb931d84 r8:00000002 r7:60000013 r6:eb931d8c r5:85550c00 r5:85550c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480880 r5:00001000 r4:eb57f000 r5:8559578c r4:85595400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559578c r4:8543b780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8543b780 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800d0113 ffffffff [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:00001000 r4:dfe13000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:423:5314 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:423 state:D stack:0 pid:5314 tgid:5314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb93dd84 r8:00000002 r7:60000013 r6:eb93dd8c r5:85553000 r4:85553000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85553000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb93de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85553000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb613000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559638c r4:85596000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559638c r4:8543b880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85553000 r8:8543b8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543b880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b880 r8:80287e08 r7:eb8d5e60 r6:8548a800 r5:85553000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb93dfb0 to 0xeb93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85480940 INFO: task kworker/0:423:5314 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a03ac000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 task:kworker/0:424 state:D stack:0 pid:5318 tgid:5318 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:eb94dd84 r8:00000002 r7:60000113 r6:eb94dd8c r5:85554800 r4:85554800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85554800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb94de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85554800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85595f8c r4:85595c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85595f8c r4:8543ba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85554800 r8:8543ba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543ba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543ba00 r8:80287e08 r7:eb93de60 r6:8548a880 r5:85554800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb94dfb0 to 0xeb94dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85480b40 INFO: task kworker/0:424:5318 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a03ac000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Exception stack(0xe0029fb0 to 0xe0029ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:425:5319 blocked for more than 472 seconds. Workqueue: events bpf_prog_free_deferred r4:85555400 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8559678c r4:85596400 r10:61c88647 r9:85555400 r8:8543baac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a08fa000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:426:5321 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:426 state:D stack:0 pid:5321 tgid:5321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:eb959d84 r8:00000002 r7:60000013 r6:eb959d8c r5:85553c00 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480e40 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85596b8c r4:85596800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85553c00 r8:8543b9ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e0029dc0 r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85551800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 r5:85597f8c r4:85597c00 r4:8543bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb95dfb0 to 0xeb95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8547f2c0 INFO: task kworker/0:427:5322 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a08fa000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85596f8c r4:85596c00 r10:61c88647 r9:85552400 r8:8543bcac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:429:5325 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:429 state:D stack:0 pid:5325 tgid:5325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb969d84 r8:00000002 r7:60000113 r6:eb969d8c r5:85556000 r4:85556000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85556000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb969e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854980c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85556000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559738c r4:85597000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559738c r4:8543bb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85556000 r8:8543bb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543bb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543bb00 r8:80287e08 r7:eb95de60 r6:8548ab00 r5:85556000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb969fb0 to 0xeb969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85498040 INFO: task kworker/0:429:5325 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a0ccb000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:430:5328 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:430 state:D stack:0 pid:5328 tgid:5328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb975d84 r8:00000002 r7:60000113 r6:eb975d8c r5:85556c00 r4:85556c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85556c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb975e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8559778c r4:85597400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85556c00 r8:8543bdac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8543bd80 r8:80287e08 r7:eb95de60 r6:8548ab80 r5:85556c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb975fb0 to 0xeb975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85498280 INFO: task kworker/0:430:5328 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a114a000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:5329 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:5329 tgid:5329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb979d84 r8:00000002 r7:60000113 r6:eb979d8c r5:85550000 r4:85550000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85550000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb979e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854982c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85550000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb711000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85597b8c r4:85597800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85597b8c r4:8543bb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85550000 r8:8543bbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543bb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543bb80 r8:80287e08 r7:eb95de60 r6:8548ac00 r5:85550000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb979fb0 to 0xeb979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854983c0 INFO: task kworker/0:431:5329 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a114a000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:432:5331 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:432 state:D stack:0 pid:5331 tgid:5331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb981d84 r8:00000002 r7:60000113 r6:eb981d8c r5:85558c00 r4:85558c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85558c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb981e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85558c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb72d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559838c r4:85598000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559838c r4:8543be00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85558c00 r8:8543be2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543be00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543be00 r8:80287e08 r7:eb95de60 r6:8548ac80 r5:85558c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb981fb0 to 0xeb981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85498280 INFO: task kworker/0:432:5331 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a152f000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:433:5333 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:433 state:D stack:0 pid:5333 tgid:5333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb989d84 r8:00000002 r7:60000113 r6:eb989d8c r5:85558000 r4:85558000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85558000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb989e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85558000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb75d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559938c r4:85599000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559938c r4:8543bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85558000 r8:8543bf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543bf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543bf00 r8:80287e08 r7:eb981e60 r6:8548ad00 r5:85558000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb989fb0 to 0xeb989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85498640 INFO: task kworker/0:433:5333 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a152f000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:5336 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:5336 tgid:5336 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb995d84 r8:00000002 r7:60000113 r6:eb995d8c r5:85559800 r4:85559800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85559800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb995e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854986c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85559800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb73b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559878c r4:85598400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559878c r4:854b4e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85559800 r8:854b4eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b4e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b4e80 r8:80287e08 r7:eb989e60 r6:8548ad80 r5:85559800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb995fb0 to 0xeb995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85498580 INFO: task kworker/0:434:5336 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a17fa000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:5338 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:5338 tgid:5338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb99dd84 r8:00000002 r7:60000013 r6:eb99dd8c r5:8555a400 r4:8555a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb99de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8555a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb745000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85598b8c r4:85598800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85598b8c r4:8543bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555a400 r8:8543bfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8543bf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543bf80 r8:80287e08 r7:eb989e60 r6:8548ae00 r5:8555a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb99dfb0 to 0xeb99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85498680 INFO: task kworker/0:435:5338 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a1d3a000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:436:5339 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:436 state:D stack:0 pid:5339 tgid:5339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb925d84 r8:00000002 r7:60000113 r6:eb925d8c r5:8483a400 r4:8483a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8483a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb925e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8483a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb753000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85598f8c r4:85598c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85598f8c r4:854b4f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8483a400 r8:854b4fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b4f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b4f80 r8:80287e08 r7:eb989e60 r6:854b4f00 r5:8483a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb925fb0 to 0xeb925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85498740 INFO: task kworker/0:436:5339 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a1d3a000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:437:5342 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:437 state:D stack:0 pid:5342 tgid:5342 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9a1d84 r8:00000002 r7:60000113 r6:eb9a1d8c r5:8483b000 r4:8483b000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8483b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8483b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb775000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85599b8c r4:85599800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85599b8c r4:854f3080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8483b000 r8:854f30ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3080 r8:80287e08 r7:eb989e60 r6:854f3000 r5:8483b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a1fb0 to 0xeb9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85498940 INFO: task kworker/0:437:5342 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a1e17000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:438:5344 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:438 state:D stack:0 pid:5344 tgid:5344 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9a5d84 r8:00000002 r7:60000013 r6:eb9a5d8c r5:8483bc00 r4:8483bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8483bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8483bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb76b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559978c r4:85599400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559978c r4:854f3100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8483bc00 r8:854f312c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3100 r8:80287e08 r7:eb9a1e60 r6:854f3200 r5:8483bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a5fb0 to 0xeb9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85498b40 INFO: task kworker/0:438:5344 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a209d000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:439:5346 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:439 state:D stack:0 pid:5346 tgid:5346 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb935d84 r8:00000002 r7:60000013 r6:eb935d8c r5:8483d400 r4:8483d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8483d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb935e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8483d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb797000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85599f8c r4:85599c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85599f8c r4:854f3280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8483d400 r8:854f32ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3280 r8:80287e08 r7:eb9a1e60 r6:854f3380 r5:8483d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb935fb0 to 0xeb935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85498c80 INFO: task kworker/0:439:5346 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a209d000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:440:5348 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:440 state:D stack:0 pid:5348 tgid:5348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9b1d84 r8:00000002 r7:60000113 r6:eb9b1d8c r5:8483e000 r4:8483e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8483e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8483e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559a38c r4:8559a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559a38c r4:854f3180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8483e000 r8:854f31ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3180 r8:80287e08 r7:eb935e60 r6:854f3300 r5:8483e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b1fb0 to 0xeb9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85478f80 INFO: task kworker/0:440:5348 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a2580000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:441:5349 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:441 state:D stack:0 pid:5349 tgid:5349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9b5d84 r8:00000002 r7:60000113 r6:eb9b5d8c r5:8483ec00 r4:8483ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8483ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f52c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8483ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559ab8c r4:8559a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559ab8c r4:854f3400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8483ec00 r8:854f342c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3400 r8:80287e08 r7:eb9b1e60 r6:854f3580 r5:8483ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b5fb0 to 0xeb9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85480fc0 INFO: task kworker/0:441:5349 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a2800000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:442:5352 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:442 state:D stack:0 pid:5352 tgid:5352 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9add84 r8:00000002 r7:60000013 r6:eb9add8c r5:8483c800 r4:8483c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8483c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ade08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8483c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7ad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559a78c r4:8559a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559a78c r4:854f3480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8483c800 r8:854f34ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3480 r8:80287e08 r7:eb9b5e60 r6:854f3680 r5:8483c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9adfb0 to 0xeb9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5100 INFO: task kworker/0:442:5352 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a29b2000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:5354 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:5354 tgid:5354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9bdd84 r8:00000002 r7:60000013 r6:eb9bdd8c r5:84838c00 r4:84838c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84838c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9bde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84838c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea983000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559b78c r4:8559b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559b78c r4:854f3500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84838c00 r8:854f352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3500 r8:80287e08 r7:eb9b5e60 r6:854f3780 r5:84838c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9bdfb0 to 0xeb9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5280 INFO: task kworker/0:443:5354 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a29b2000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:444:5356 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:444 state:D stack:0 pid:5356 tgid:5356 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7d9d84 r8:00000002 r7:60000013 r6:eb7d9d8c r5:855ea400 r4:855ea400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ea400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559af8c r4:8559ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559af8c r4:854f3600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ea400 r8:854f362c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3600 r8:80287e08 r7:eb9bde60 r6:854f3800 r5:855ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d9fb0 to 0xeb7d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5400 INFO: task kworker/0:444:5356 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a2cd7000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:445:5358 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:445 state:D stack:0 pid:5358 tgid:5358 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7ddd84 r8:00000002 r7:60000113 r6:eb7ddd8c r5:84923c00 r4:84923c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84923c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7dde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84923c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559b38c r4:8559b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559b38c r4:854f3880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84923c00 r8:854f38ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3880 r8:80287e08 r7:eb9bde60 r6:854f3700 r5:84923c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7ddfb0 to 0xeb7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5400 INFO: task kworker/0:445:5358 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a2cd7000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:446:5360 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:446 state:D stack:0 pid:5360 tgid:5360 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7f1d84 r8:00000002 r7:60000113 r6:eb7f1d8c r5:84950000 r4:84950000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84950000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f58c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84950000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac73000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559bb8c r4:8559b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559bb8c r4:854f3900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84950000 r8:854f392c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3900 r8:80287e08 r7:eb9bde60 r6:854f3a80 r5:84950000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f1fb0 to 0xeb7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5700 INFO: task kworker/0:446:5360 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a3256000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:447:5362 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:447 state:D stack:0 pid:5362 tgid:5362 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb825d84 r8:00000002 r7:60000113 r6:eb825d8c r5:84950c00 r4:84950c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84950c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb825e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84950c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae99000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559bf8c r4:8559bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559bf8c r4:854f3a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84950c00 r8:854f3a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3a00 r8:80287e08 r7:eb7f1e60 r6:854f3b00 r5:84950c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb825fb0 to 0xeb825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5880 INFO: task kworker/0:447:5362 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a3256000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:448:5364 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:448 state:D stack:0 pid:5364 tgid:5364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb859d84 r8:00000002 r7:60000113 r6:eb859d8c r5:84951800 r4:84951800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84951800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb859e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84951800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a038c r4:855a0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855a038c r4:854f3980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84951800 r8:854f39ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3980 r8:80287e08 r7:eb825e60 r6:854f3c80 r5:84951800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb859fb0 to 0xeb859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5880 INFO: task kworker/0:448:5364 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a3256000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:449:5366 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:449 state:D stack:0 pid:5366 tgid:5366 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb871d84 r8:00000002 r7:60000113 r6:eb871d8c r5:84952400 r4:84952400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84952400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb871e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84952400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb171000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a078c r4:855a0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855a078c r4:854f3b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84952400 r8:854f3bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3b80 r8:80287e08 r7:eb859e60 r6:854f3d80 r5:84952400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb871fb0 to 0xeb871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5b80 INFO: task kworker/0:449:5366 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a359e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:450:5368 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:450 state:D stack:0 pid:5368 tgid:5368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb895d84 r8:00000002 r7:60000113 r6:eb895d8c r5:8555d400 r4:8555d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8555d400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a0b8c r4:855a0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855a0b8c r4:854f3c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555d400 r8:854f3c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3c00 r8:80287e08 r7:eb871e60 r6:8548ae80 r5:8555d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb895fb0 to 0xeb895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5d00 INFO: task kworker/0:450:5368 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a3844000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:451:5370 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:451 state:D stack:0 pid:5370 tgid:5370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9c1d84 r8:00000002 r7:60000013 r6:eb9c1d8c r5:8555bc00 r4:8555bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85512040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8555bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb32f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a0f8c r4:855a0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855a0f8c r4:854f3e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555bc00 r8:854f3eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3e80 r8:80287e08 r7:eb895e60 r6:8548af00 r5:8555bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c1fb0 to 0xeb9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85512080 INFO: task kworker/0:451:5370 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a3844000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:452:5372 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:452 state:D stack:0 pid:5372 tgid:5372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9c5d84 r8:00000002 r7:60000013 r6:eb9c5d8c r5:8555c800 r4:8555c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85512580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8555c800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb547000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a1b8c r4:855a1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855a1b8c r4:854f3e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555c800 r8:854f3e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3e00 r8:80287e08 r7:eb9c1e60 r6:8548af80 r5:8555c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c5fb0 to 0xeb9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85512280 INFO: task kworker/0:452:5372 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a3b0f000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:453:5374 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:453 state:D stack:0 pid:5374 tgid:5374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb875d84 r8:00000002 r7:60000013 r6:eb875d8c r5:8555e000 r4:8555e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb875e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85512180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8555e000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb357000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a138c r4:855a1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855a138c r4:854f3f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555e000 r8:854f3fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3f80 r8:80287e08 r7:eb9c5e60 r6:85525000 r5:8555e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb875fb0 to 0xeb875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85512140 INFO: task kworker/0:453:5374 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a3e62000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:454:5375 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:454 state:D stack:0 pid:5375 tgid:5375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9c9d84 r8:00000002 r7:60000113 r6:eb9c9d8c r5:8555b000 r4:8555b000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85512500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8555b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb51b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a178c r4:855a1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855a178c r4:854f3f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555b000 r8:854f3f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3f00 r8:80287e08 r7:eb9c5e60 r6:85525080 r5:8555b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c9fb0 to 0xeb9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85512140 INFO: task kworker/0:454:5375 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a3e62000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:667:5378 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:667 state:D stack:0 pid:5378 tgid:5378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8c1d84 r8:00000002 r7:60000013 r6:eb8c1d8c r5:8555ec00 r4:8555ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551dd80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8555ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f011000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac15000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d4b8c r4:855d4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855d4b8c r4:85525100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555ec00 r8:8552512c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85525100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85525100 r8:80287e08 r7:eb8f1e60 r6:85525200 r5:8555ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c1fb0 to 0xeb8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854aac00 INFO: task kworker/1:667:5378 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a4050000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:668:5380 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:668 state:D stack:0 pid:5380 tgid:5380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9b9d84 r8:00000002 r7:60000113 r6:eb9b9d8c r5:85416000 r4:85416000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85416000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551d780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85416000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb87d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e4f8c r4:855e4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e4f8c r4:85525280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85416000 r8:855252ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85525280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85525280 r8:80287e08 r7:eb8c1e60 r6:85525180 r5:85416000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b9fb0 to 0xeb9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854aac00 INFO: task kworker/1:668:5380 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a45cf000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:5383 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:5383 tgid:5383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9d9d84 r8:00000002 r7:60000113 r6:eb9d9d8c r5:85601800 r4:85601800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85601800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855126c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85601800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb569000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a1f8c r4:855a1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855a1f8c r4:8550e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85601800 r8:8550e02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550e000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550e000 r8:80287e08 r7:eb9c5e60 r6:85525300 r5:85601800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d9fb0 to 0xeb9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855127c0 INFO: task kworker/0:455:5383 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a47c8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:456:5385 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:456 state:D stack:0 pid:5385 tgid:5385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9e1d84 r8:00000002 r7:60000013 r6:eb9e1d8c r5:85600000 r4:85600000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85600000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85512c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85600000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a2f8c r4:855a2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855a2f8c r4:8550e100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85600000 r8:8550e12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550e100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550e100 r8:80287e08 r7:eb9d9e60 r6:85525380 r5:85600000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e1fb0 to 0xeb9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855124c0 INFO: task kworker/0:456:5385 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a4a3f000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:457:5386 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:457 state:D stack:0 pid:5386 tgid:5386 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9e5d84 r8:00000002 r7:60000013 r6:eb9e5d8c r5:85603000 r4:85603000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85603000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85512880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85603000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb697000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a238c r4:855a2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855a238c r4:8550e180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85603000 r8:8550e1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550e180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550e180 r8:80287e08 r7:eb9e1e60 r6:85525400 r5:85603000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e5fb0 to 0xeb9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855124c0 INFO: task kworker/0:457:5386 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a4a3f000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:458:5388 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:458 state:D stack:0 pid:5388 tgid:5388 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9f1d84 r8:00000002 r7:60000013 r6:eb9f1d8c r5:85602400 r4:85602400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85602400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855129c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85602400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a278c r4:855a2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855a278c r4:8550e280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85602400 r8:8550e2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550e280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550e280 r8:80287e08 r7:eb9e1e60 r6:85525480 r5:85602400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f1fb0 to 0xeb9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85512840 INFO: task kworker/0:458:5388 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a4d46000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:459:5390 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:459 state:D stack:0 pid:5390 tgid:5390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9cdd84 r8:00000002 r7:60000113 r6:eb9cdd8c r5:84953000 r4:84953000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84953000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9cde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85512b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84953000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a2b8c r4:855a2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855a2b8c r4:8550e300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84953000 r8:8550e32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550e300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550e300 r8:80287e08 r7:eb9e1e60 r6:8550e380 r5:84953000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9cdfb0 to 0xeb9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85512900 INFO: task kworker/0:459:5390 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a4d46000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:460:5392 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:460 state:D stack:0 pid:5392 tgid:5392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9f5d84 r8:00000002 r7:60000013 r6:eb9f5d8c r5:84954800 r4:84954800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84954800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85512e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84954800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a338c r4:855a3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855a338c r4:8550e080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84954800 r8:8550e0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550e080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550e080 r8:80287e08 r7:eb9e1e60 r6:8550e480 r5:84954800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f5fb0 to 0xeb9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85512d40 INFO: task kworker/0:460:5392 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a5498000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:461:5395 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:461 state:D stack:0 pid:5395 tgid:5395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9f9d84 r8:00000002 r7:60000013 r6:eb9f9d8c r5:84955400 r4:84955400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84955400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85512e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84955400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a378c r4:855a3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855a378c r4:8550e200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84955400 r8:8550e22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550e200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550e200 r8:80287e08 r7:eb9f5e60 r6:8550e500 r5:84955400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f9fb0 to 0xeb9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85512dc0 INFO: task kworker/0:461:5395 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a5498000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:462:5397 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:462 state:D stack:0 pid:5397 tgid:5397 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9fdd84 r8:00000002 r7:60000113 r6:eb9fdd8c r5:84956000 r4:84956000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84956000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9fde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565a440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84956000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb841000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e478c r4:855e4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e478c r4:8550e580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84956000 r8:8550e5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550e580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550e580 r8:80287e08 r7:eb9f9e60 r6:8550e680 r5:84956000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9fdfb0 to 0xeb9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85512ec0 INFO: task kworker/0:462:5397 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a5498000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:463:5398 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:463 state:D stack:0 pid:5398 tgid:5398 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9d1d84 r8:00000002 r7:60000013 r6:eb9d1d8c r5:84956c00 r4:84956c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84956c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84956c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a3b8c r4:855a3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855a3b8c r4:8550e400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84956c00 r8:8550e42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550e400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550e400 r8:80287e08 r7:eb9fde60 r6:8550e600 r5:84956c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d1fb0 to 0xeb9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85512ec0 INFO: task kworker/0:463:5398 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a5d63000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:464:5401 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:464 state:D stack:0 pid:5401 tgid:5401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba05d84 r8:00000002 r7:60000013 r6:eba05d8c r5:85540000 r4:85540000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85540000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba05e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565a040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85540000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb809000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a3f8c r4:855a3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855a3f8c r4:8550e700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85540000 r8:8550e72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550e700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550e700 r8:80287e08 r7:eb9fde60 r6:8550e880 r5:85540000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba05fb0 to 0xeba05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8565a100 INFO: task kworker/0:464:5401 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a5d63000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:465:5402 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:465 state:D stack:0 pid:5402 tgid:5402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba09d84 r8:00000002 r7:60000013 r6:eba09d8c r5:85540c00 r4:85540c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85540c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba09e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565a240 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85540c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb833000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e438c r4:855e4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e438c r4:8550e780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85540c00 r8:8550e7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550e780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550e780 r8:80287e08 r7:eb9fde60 r6:8550e980 r5:85540c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba09fb0 to 0xeba09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8565a340 INFO: task kworker/0:465:5402 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a5edc000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:466:5405 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:466 state:D stack:0 pid:5405 tgid:5405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba0dd84 r8:00000002 r7:60000113 r6:eba0dd8c r5:85543000 r4:85543000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85543000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba0de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565a680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85543000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb867000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e4b8c r4:855e4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e4b8c r4:8550e800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85543000 r8:8550e82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550e800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550e800 r8:80287e08 r7:eb9fde60 r6:8550ea80 r5:85543000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba0dfb0 to 0xeba0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8565a400 INFO: task kworker/0:466:5405 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a61ce000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:467:5407 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:467 state:D stack:0 pid:5407 tgid:5407 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba11d84 r8:00000002 r7:60000113 r6:eba11d8c r5:85543c00 r4:85543c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85543c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba11e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565a840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85543c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e578c r4:855e5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e578c r4:8550e900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85543c00 r8:8550e92c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:669:5409 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:669 state:D stack:0 pid:5409 tgid:5409 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba19d84 r8:00000002 r7:60000113 r6:eba19d8c r5:85541800 r4:85541800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85541800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba19e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551db00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85541800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb897000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8427db8c r4:8427d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8427db8c r4:85525500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85541800 r8:8552552c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85525500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85525500 r8:80287e08 r7:eb8c1e60 r6:8550ea00 r5:85541800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba19fb0 to 0xeba19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8551d840 INFO: task kworker/1:669:5409 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a6704000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:468:5411 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:468 state:D stack:0 pid:5411 tgid:5411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba25d84 r8:00000002 r7:60000113 r6:eba25d8c r5:85545400 r4:85545400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85545400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba25e08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:855e538c r4:855e5000 r7:dddced80 r6:83018000 r5:855e538c r4:8550ec80 r10:00000000 r9:8550ec80 r8:80287e08 r7:eba11e60 r6:8550eb00 r5:85545400 r4:8565ac40 [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:e0029dc0 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:dfabd000 r5:855d478c r4:855d4400 r10:61c88647 r9:85544800 r8:855255ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:671:5416 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:671 state:D stack:0 pid:5416 tgid:5416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb941d84 r8:00000002 r7:60000113 r6:eb941d8c r5:85546000 r4:85546000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85546000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb941e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565f4c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85546000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d5b8c r4:855d5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855d5b8c r4:85525680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85546000 r8:855256ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85525680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85525680 r8:80287e08 r7:eb8c1e60 r6:8550ee80 r5:85546000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb941fb0 to 0xeb941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8551ddc0 INFO: task kworker/1:671:5416 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a7053000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:e0029dc0 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:672 state:D stack:0 pid:5418 tgid:5418 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb909e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:855d4f8c r4:85525600 r4:85525600 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:469:5419 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:469 state:D stack:0 pid:5419 tgid:5419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba01d84 r8:00000002 r7:60000113 r6:eba01d8c r5:85542400 r4:85542400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85542400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba01e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85542400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb013000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e5b8c r4:855e5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e5b8c r4:8550ef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85542400 r8:8550ef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550ef00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550ef00 r8:80287e08 r7:eba11e60 r6:8550ef80 r5:85542400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba01fb0 to 0xeba01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8565a940 INFO: task kworker/0:469:5419 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a793d000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85603c00 r4:8291a680 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85603c00 r8:8550edac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: a7a82000 ed729000 00000001 80239b98 7f565000 00000001 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84aebb8c r4:84aeb800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:855e5f8c r4:855e5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e5f8c r4:854f3d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85605400 r8:854f3d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854f3d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f3d00 r8:80287e08 r7:eba15e60 r6:85525700 r5:85605400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba2dfb0 to 0xeba2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855260c0 INFO: task kworker/0:471:5424 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a7ee3000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:472:5426 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:472 state:D stack:0 pid:5426 tgid:5426 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba35d84 r8:00000002 r7:60000113 r6:eba35d8c r5:85606000 r4:85606000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85606000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba35e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:855e738c r4:855e7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8552e000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:8462f100 task:kworker/0:473 state:D stack:0 pid:5428 tgid:5428 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba3de08 r9:83018005 r8:85604800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r5:855e678c r4:855e6400 r10:61c88647 r9:85604800 r8:8552e1ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a80ee000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:474:5429 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:474 state:D stack:0 pid:5429 tgid:5429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba41d84 r8:00000002 r7:60000113 r6:eba41d8c r5:85606c00 r4:85606c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85606c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba41e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85606c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb375000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e6b8c r4:855e6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e6b8c r4:8552e080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85606c00 r8:8552e0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8552e080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552e080 r8:80287e08 r7:eba35e60 r6:85525900 r5:85606c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:82ac21e4 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eba49d84 r8:00000002 r7:60000113 r6:eba49d8c r5:84810c00 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb3eb000 r5:855e6f8c r4:855e6c00 r10:61c88647 r9:84810c00 r8:8552e2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8552e280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552e280 r8:80287e08 r7:eba35e60 r6:85525980 r5:84810c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba49fb0 to 0xeba49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85526400 INFO: task kworker/0:475:5431 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a83de000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 INFO: task kworker/0:476:5433 blocked for more than 473 seconds. r10:8291a684 r9:eba51d84 r8:00000002 r7:60000013 r6:eba51d8c r5:84810000 r4:84810000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84810000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba51e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84810000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb581000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e778c r4:855e7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e778c r4:8552e100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84810000 r8:8552e12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8552e100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552e100 r8:80287e08 r7:eba35e60 r6:85525a00 r5:84810000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba51fb0 to 0xeba51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85526580 INFO: task kworker/0:476:5433 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 9d20: a8803000 ed729000 00000001 80239b98 7f565000 00000001 r4:e0029dc0 r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84811800 r4:8291a680 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8562838c r4:85628000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562838c r4:8552e380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84811800 r8:8552e3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8552e380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552e380 r8:80287e08 r7:eba51e60 r6:85525a80 r5:84811800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba59fb0 to 0xeba59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85526680 INFO: task kworker/0:477:5435 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a89d4000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:849a8000 Exception stack(0xe0029fb0 to 0xe0029ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84812400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba61e08 r9:83018005 r8:84812400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r7:dddced80 r6:83018000 r5:855e7b8c r4:8552e200 r4:8552e200 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8462f100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba69e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84813000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e7f8c r4:855e7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e7f8c r4:8552e400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84813000 r8:8552e42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8552e400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552e400 r8:80287e08 r7:eba59e60 r6:85525b80 r5:84813000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba69fb0 to 0xeba69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85526880 INFO: task kworker/0:479:5439 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a8d4f000 ed729000 00000001 80239b98 7f565000 00000001 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:5440 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:480 state:D stack:0 pid:5440 tgid:5440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba6dd84 r8:00000002 r7:60000113 r6:eba6dd8c r5:84814800 r4:84814800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb6f1000 r5:8562878c r4:85628400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84814800 r8:8552e32c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8462f100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84815400 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84815400 r8:85525cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) 9d60: 80230ad0 80239bb0 800d0113 ffffffff [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84aebb8c r4:84aeb800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba79e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84816000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb71b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85628b8c r4:85628800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85628b8c r4:8552e580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84816000 r8:8552e5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8552e580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552e580 r8:80287e08 r7:eba6de60 r6:85525d00 r5:84816000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba79fb0 to 0xeba79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85526d80 INFO: task kworker/0:481:5446 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a920e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:5449 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566a880 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8552e500 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:483:5450 blocked for more than 473 seconds. Call trace: [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565ff80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab51000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d578c r4:855d5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855d578c r4:8552e600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e8c00 r8:8552e62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8552e600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552e600 r8:80287e08 r7:eb96de60 r6:8552e480 r5:848e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba71fb0 to 0xeba71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85526e80 INFO: task kworker/0:483:5450 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a97b0000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb119000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: a97b0000 ed729000 00000001 80239b98 7f565000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:848e9800 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565f080 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d638c r4:855d6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855d638c r4:854a7d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e9800 r8:854a7d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854a7d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a7d00 r8:80287e08 r7:eb8e9e60 r6:8552e780 r5:848e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e9fb0 to 0xeb9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8565f340 INFO: task kworker/1:675:5457 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a9b1a000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8462f100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb6bb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8552e800 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: 9d20: a9ba3000 ed729000 00000001 80239b98 7f565000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:676 state:D stack:0 pid:5460 tgid:5460 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb349000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d678c r4:855d6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855d678c r4:85525e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ea400 r8:85525eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85525e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85525e80 r8:80287e08 r7:eb9e9e60 r6:8552e900 r5:848ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba89fb0 to 0xeba89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85671100 INFO: task kworker/1:676:5460 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: a9e95000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:677:5462 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:eba8dd84 r8:00000002 r7:60000113 r6:eba8dd8c r5:848ed400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba8de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671200 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:848ed400 r8:85429eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800d0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:678:5463 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:678 state:D stack:0 pid:5463 tgid:5463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba91d84 r8:00000002 r7:60000013 r6:eba91d8c r5:848ee000 r4:848ee000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ee000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba91e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb529000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d738c r4:855d7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855d738c r4:85525f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ee000 r8:85525f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85525f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85525f00 r8:80287e08 r7:eba8de60 r6:8552ea00 r5:848ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba91fb0 to 0xeba91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856711c0 INFO: task kworker/1:678:5463 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: aa174000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:679 state:D stack:0 pid:5465 tgid:5465 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856713c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:855d6f8c r4:8566f080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: aa564000 ed729000 00000001 80239b98 7f565000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r5:00001000 r4:dfe13000 r4:849a8000 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:848ebc00 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb567000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:848ebc00 r8:8566f02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566f000 r8:80287e08 r7:eba91e60 r6:8552eb00 r5:848ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba99fb0 to 0xeba99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85671580 INFO: task kworker/1:680:5467 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: aa75d000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:681:5469 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:681 state:D stack:0 pid:5469 tgid:5469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba9dd84 r8:00000002 r7:60000013 r6:eba9dd8c r5:848e8000 r4:848e8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba9de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb699000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d7b8c r4:855d7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855d7b8c r4:8566f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e8000 r8:8566f22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566f200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566f200 r8:80287e08 r7:eba99e60 r6:8552eb80 r5:848e8000 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 9d60: 80230ad0 80239bb0 800d0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:682:5471 blocked for more than 473 seconds. Call trace: [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856718c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84953c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb72b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d7f8c r4:855d7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855d7f8c r4:8566f180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84953c00 r8:8566f1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566f180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566f180 r8:80287e08 r7:eba9de60 r6:8552ec00 r5:84953c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e1fb0 to 0xeb8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85671740 INFO: task kworker/1:682:5471 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: aabe5000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84aebb8c r4:84aeb800 r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:485:5474 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:485 state:D stack:0 pid:5474 tgid:5474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaa1d84 r8:00000002 r7:60000113 r6:ebaa1d8c r5:85690000 r4:85690000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85690000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85667a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85690000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb607000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562a38c r4:8562a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562a38c r4:8552ed80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85690000 r8:8552edac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8552ed80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552ed80 r8:80287e08 r7:eb96de60 r6:8552ec80 r5:85690000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa1fb0 to 0xebaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8566a500 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) r5:800d0113 r4:80239bb0 r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:8462f100 task:kworker/1:684 state:D stack:0 pid:5477 tgid:5477 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671a00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xebaa9fb0 to 0xebaa9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ab0b9000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:486:5479 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:486 state:D stack:0 pid:5479 tgid:5479 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9ddd84 r8:00000002 r7:60000113 r6:eb9ddd8c r5:85692400 r4:85692400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85692400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb7b7000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8552ef80 r8:80287e08 r7:ebaa1e60 r6:8552ee80 r5:85692400 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:685:5482 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:685 state:D stack:0 pid:5482 tgid:5482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebab5d84 r8:00000002 r7:60000113 r6:ebab5d8c r5:85694800 r4:85694800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85694800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85694800 r8:8566f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671d00 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:686:5483 blocked for more than 474 seconds. Call trace: [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8566f480 r8:80287e08 r7:ebab5e60 r6:8566f580 r5:85608000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:687:5485 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:687 state:D stack:0 pid:5485 tgid:5485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebab1d84 r8:00000002 r7:60000013 r6:ebab1d8c r5:8560a400 r4:8560a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551dac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8560a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb78d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e138c r4:855e1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e138c r4:8566f500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560a400 r8:8566f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566f500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566f500 r8:80287e08 r7:eba81e60 r6:8566f680 r5:8560a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab1fb0 to 0xebab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85671ec0 INFO: task kworker/1:687:5485 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: abe80000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:8462f100 task:kworker/1:688 state:D stack:0 pid:5487 tgid:5487 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e178c r4:855e1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e178c r4:8566f300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560b000 r8:8566f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566f300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566f300 r8:80287e08 r7:ebab1e60 r6:8566f600 r5:8560b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaadfb0 to 0xebaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85671c00 INFO: task kworker/1:688:5487 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: abe80000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:689:5489 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:689 state:D stack:0 pid:5489 tgid:5489 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:85609800 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: ac13c000 ed729000 00000001 80239b98 7f565000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:487:5491 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:487 state:D stack:0 pid:5491 tgid:5491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebac5d84 r8:00000002 r7:60000113 r6:ebac5d8c r5:8560d400 r4:8560d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566ae80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8560d400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562978c r4:85629400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562978c r4:8566b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560d400 r8:8566b02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8566b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566b000 r8:80287e08 r7:ebaa1e60 r6:8566f780 r5:8560d400 Exception stack(0xebac5fb0 to 0xebac5ff8) r4:8566ad00 Workqueue: events bpf_prog_free_deferred [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ac13c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:690:5493 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:690 state:D stack:0 pid:5493 tgid:5493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebac9d84 r8:00000002 r7:60000113 r6:ebac9d8c r5:8560c800 r4:8560c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac9e08 r4:00000000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb827000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ac2c4000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:488:5495 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:488 state:D stack:0 pid:5495 tgid:5495 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebad1d84 r8:00000002 r7:60000113 r6:ebad1d8c r5:8560ec00 r4:8560ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85629f8c r4:85629c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560ec00 r8:8566b0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8566b080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566b080 r8:80287e08 r7:ebaa1e60 r6:8566f900 r5:8560ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad1fb0 to 0xebad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8566adc0 INFO: task kworker/0:488:5495 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ac2c4000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r4:849a8000 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:691 state:D stack:0 pid:5497 tgid:5497 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e238c r4:855e2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xebacdfb0 to 0xebacdff8) r4:8566c600 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566ca40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566fa80 r8:80287e08 r7:ebacde60 r6:8566fc80 r5:8560e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab9fb0 to 0xebab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8566c6c0 INFO: task kworker/1:692:5499 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ac636000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:693:5501 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:693 state:D stack:0 pid:5501 tgid:5501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebac1d84 r8:00000002 r7:60000113 r6:ebac1d8c r5:85608c00 r4:85608c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85608c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566c900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85608c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb869000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e278c r4:855e2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e278c r4:8566fb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85608c00 r8:8566fb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566fb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566fb00 r8:80287e08 r7:ebab9e60 r6:8566fd00 r5:85608c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebac1fb0 to 0xebac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8566c8c0 INFO: task kworker/1:693:5501 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r5:800d0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 INFO: task kworker/1:694:5502 blocked for more than 474 seconds. r10:8291a684 r9:ebad9d84 r8:00000002 r7:60000113 r6:ebad9d8c r5:84816c00 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8566fd80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8566c8c0 INFO: task kworker/1:694:5502 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: acd24000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:695:5504 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:695 state:D stack:0 pid:5504 tgid:5504 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaddd84 r8:00000002 r7:60000113 r6:ebaddd8c r5:85695400 r4:85695400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85695400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebadde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566cd40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85695400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb899000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e2f8c r4:855e2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e2f8c r4:8566fe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85695400 r8:8566fe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566fe00 r10:00000000 r9:8566fe00 r8:80287e08 r7:ebad9e60 r6:8566b200 r5:85695400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: acd24000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:696:5507 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:696 state:D stack:0 pid:5507 tgid:5507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:85696000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d20: ad157000 ed729000 00000001 80239b98 7f565000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:8462f100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb985e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566cec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85696c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e378c r4:855e3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e378c r4:8566ff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85696c00 r8:8566ff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566ff00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566ff00 r8:80287e08 r7:eb971e60 r6:8566b180 r5:85696c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb985fb0 to 0xeb985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8566cf00 INFO: task kworker/1:697:5509 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ad157000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:699:5512 blocked for more than 474 seconds. r4:85693c00 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663180 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e3f8c r4:855e3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e3f8c r4:85664000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85693c00 r8:8566402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85664000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85664000 r8:80287e08 r7:eb98de60 r6:8566b300 r5:85693c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae9fb0 to 0xebae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85663000 INFO: task kworker/1:699:5512 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ad4ed000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:700:5515 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:700 state:D stack:0 pid:5515 tgid:5515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaf5d84 r8:00000002 r7:60000013 r6:ebaf5d8c r5:84861800 r4:84861800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84861800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856632c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cc38c r4:856cc000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf5fb0 to 0xebaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85663140 INFO: task kworker/1:700:5515 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: adc6c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84860000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ccb8c r4:856cc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ccb8c r4:85664180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84860000 r8:856641ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85664180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85664180 r8:80287e08 r7:eb98de60 r6:8566b400 r5:84860000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf1fb0 to 0xebaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85663400 INFO: task kworker/1:701:5518 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: adc6c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cd78c r4:856cd400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:489:5523 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:489 state:D stack:0 pid:5523 tgid:5523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebad5d84 r8:00000002 r7:60000113 r6:ebad5d8c r5:84862400 r4:84862400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84862400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855117c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84862400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562b78c r4:8562b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562b78c r4:8566b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84862400 r8:8566b5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8566b580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566b580 r8:80287e08 r7:ebaa1e60 r6:8566b500 r5:84862400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad5fb0 to 0xebad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85667980 INFO: task kworker/0:489:5523 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:8462f100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eb631000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85664200 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:490:5526 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:490 state:D stack:0 pid:5526 tgid:5526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb01d84 r8:00000002 r7:60000113 r6:ebb01d8c r5:84863c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84863c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb01e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856675c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84863c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb98f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562a78c r4:8562a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562a78c r4:8566b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84863c00 r8:8566b4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8566b480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566b480 r8:80287e08 r7:ebad5e60 r6:8566b680 r5:84863c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb01fb0 to 0xebb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85667b00 INFO: task kworker/0:490:5526 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ae711000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856639c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85619800 r8:8566412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:705:5530 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:705 state:D stack:0 pid:5530 tgid:5530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb05d84 r8:00000002 r7:60000113 r6:ebb05d8c r5:8561a400 r4:8561a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8561a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb05e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cdb8c r4:856cd800 r7:ddde2d80 r6:83018200 r5:856cdb8c r4:85664480 r10:00000000 r9:85664480 r8:80287e08 r7:ebae1e60 r6:85664580 r5:8561a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 9d20: ae81e000 ed729000 00000001 80239b98 7f565000 00000001 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856cdf8c r4:856cdc00 r10:61c88647 r9:8561b000 r8:856643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:707:5534 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:707 state:D stack:0 pid:5534 tgid:5534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb09d84 r8:00000002 r7:60000013 r6:ebb09d8c r5:8561bc00 r4:8561bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8561bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb09e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551a280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8561bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb955000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cef8c r4:856cec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856cef8c r4:85664600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8561bc00 r8:8566462c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85664600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85664600 r8:80287e08 r7:ebb0de60 r6:85664700 r5:8561bc00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:800d0113 r4:80239bb0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:8291a684 r9:ebb11d84 r8:00000002 r7:60000113 r6:ebb11d8c r5:8561c800 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb11e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565ffc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8561c800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8cf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ce38c r4:856ce000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ce38c r4:85664780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8561c800 r8:856647ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85664780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85664780 r8:80287e08 r7:ebb09e60 r6:85664680 r5:8561c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb11fb0 to 0xebb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85663ec0 INFO: task kworker/1:708:5535 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: aeda4000 ed729000 00000001 80239b98 7f565000 00000001 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:00001000 r4:dfe13000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Call trace: r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0029d28 to 0xe0029d70) 9d20: af54e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:8462f100 r10:8291a684 r9:ebb15d84 r8:00000002 r7:60000013 r6:ebb15d8c r5:8561d400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551a200 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Workqueue: events bpf_prog_free_deferred [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r7:ddde2d80 r6:83018200 r5:8562ab8c r4:85664a00 r10:00000000 r9:85664a00 r8:80287e08 r7:ebb09e60 r6:85664980 r5:8561ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb1dfb0 to 0xebb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8551a2c0 INFO: task kworker/1:711:5542 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: af990000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8462f100 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:713:5547 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:713 state:D stack:0 pid:5547 tgid:5547 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb21d84 r8:00000002 r7:60000113 r6:ebb21d8c r5:84a60c00 r4:84a60c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a60c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb21e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551acc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a61800 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8551a740 INFO: task kworker/1:714:5549 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: afd80000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8462f100 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85513040 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b0206000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 9fa0: 00000000 00000000 00000000 00000000 r5:84a60000 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551ab40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a60000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba2f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85664d80 r8:80287e08 r7:ebb21e60 r6:85664e80 r5:84a60000 Call trace: 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:00000000 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85664f00 r8:80287e08 r7:ebb21e60 r6:85664e00 r5:84a63c00 Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b03e9000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:717:5556 blocked for more than 474 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb3de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a63000 r8:85525fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:00001000 r4:dfe13000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Not tainted 6.15.0-rc7-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb4de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d8f8c r4:856d8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d8f8c r4:85521080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a64800 r8:855210ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85521080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85521080 r8:80287e08 r7:ebb3de60 r6:85521180 r5:84a64800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb4dfb0 to 0xebb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85513300 INFO: task kworker/1:718:5560 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849a8000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a66000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad0 80239bb0 800d0113 ffffffff [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe0029fb0 to 0xe0029ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xebb5dfb0 to 0xebb5dff8) Workqueue: events bpf_prog_free_deferred r5:800d0113 r4:80239bb0 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:720:5565 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:720 state:D stack:0 pid:5565 tgid:5565 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d938c r4:856d9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d938c r4:85521200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85618000 r8:8552122c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85521200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85521200 r8:80287e08 r7:ebb51e60 r6:8566b980 r5:85618000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb69fb0 to 0xebb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85513240 INFO: task kworker/1:720:5565 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b0cb1000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:721:5566 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:721 state:D stack:0 pid:5566 tgid:5566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb6dd84 r8:00000002 r7:60000013 r6:ebb6dd8c r5:84860c00 r4:84860c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84860c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb6de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855137c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84860c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb59000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d978c r4:856d9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d978c r4:85521300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84860c00 r8:8552132c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85521300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85521300 r8:80287e08 r7:ebb51e60 r6:8566ba00 r5:84860c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb6dfb0 to 0xebb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85513240 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a65400 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8462f100 r4:84a66c00 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a66c00 r8:855212ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85521280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85521280 r8:80287e08 r7:ebb41e60 r6:85521500 r5:84a66c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb35fb0 to 0xebb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85513d80 INFO: task kworker/1:723:5570 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d20: b1302000 ed729000 00000001 80239b98 7f565000 00000001 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85620000 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85513cc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85521480 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:725:5574 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85620c00 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85521680 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:726:5576 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85667540 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xebb79fb0 to 0xebb79ff8) Call trace: r5:800d0113 r4:80239bb0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba5e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:856dbf8c r4:85521880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85623c00 r8:855218ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85521880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85521880 r8:80287e08 r7:ebb79e60 r6:85521780 r5:85623c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba5fb0 to 0xebba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8550c040 INFO: task kworker/1:727:5578 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b1bec000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Exception stack(0xe0029fb0 to 0xe0029ff8) Workqueue: events bpf_prog_free_deferred [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84878000 r8:8566baac r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r5:84aebb8c r4:84aeb800 r4:00000001 INFO: task kworker/0:494:5584 blocked for more than 474 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84879800 r8:8566bc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8566bc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566bc00 r8:80287e08 r7:ebba1e60 r6:8566bc80 r5:84879800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb9fb0 to 0xebbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855119c0 INFO: task kworker/0:494:5584 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b2076000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:495:5587 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:495 state:D stack:0 pid:5587 tgid:5587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8487b000 r8:8566bd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85511ac0 r4:00000000 r4:82ac21e4 r4:00000000 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:496:5589 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:496 state:D stack:0 pid:5589 tgid:5589 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbbdd84 r8:00000002 r7:60000013 r6:ebbbdd8c r5:8487c800 r4:8487c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8487c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbbde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:85511c00 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b25c3000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:728 state:D stack:0 pid:5590 tgid:5590 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8487a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550c400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8487a400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856db38c r4:856db000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856db38c r4:85521900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487a400 r8:8552192c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85521900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85521900 r8:80287e08 r7:ebba5e60 r6:8566bd80 r5:8487a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc5fb0 to 0xebbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8550c500 INFO: task kworker/1:728:5590 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b25c3000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:729 state:D stack:0 pid:5591 tgid:5591 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550c6c0 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8487d400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb52d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856db78c r4:856db400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856db78c r4:85521a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487d400 r8:85521aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85521a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85521a80 r8:80287e08 r7:ebba5e60 r6:8566bf80 r5:8487d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc9fb0 to 0xebbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8550c500 INFO: task kworker/1:729:5591 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b292b000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:497:5592 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:497 state:D stack:0 pid:5592 tgid:5592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbcdd84 r8:00000002 r7:60000113 r6:ebbcdd8c r5:8487e000 r4:8487e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8487e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbcde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855114c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8487e000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8478ef8c r4:8478ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8478ef8c r4:8566be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487e000 r8:8566beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8566be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566be80 r8:80287e08 r7:ebbbde60 r6:8543bd00 r5:8487e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbcdfb0 to 0xebbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85511dc0 INFO: task kworker/0:497:5592 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b2e6b000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:498:5595 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:498 state:D stack:0 pid:5595 tgid:5595 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbd5d84 r8:00000002 r7:60000113 r6:ebbd5d8c r5:8487bc00 r4:8487bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8487bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855174c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8487bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8487bc00 r8:855140ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85514080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85514080 r8:80287e08 r7:ebbbde60 r6:85514180 r5:8487bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbd5fb0 to 0xebbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85517100 INFO: task kworker/0:498:5595 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b2e6b000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:499:5597 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:499 state:D stack:0 pid:5597 tgid:5597 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbd9d84 r8:00000002 r7:60000113 r6:ebbd9d8c r5:84878c00 r4:84878c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84878c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855172c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84878c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 r5:00001000 r4:eb6cd000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564078c r4:85640400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564078c r4:85514000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84878c00 r8:8551402c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85514000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85514000 r8:80287e08 r7:ebbd5e60 r6:85514280 r5:84878c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbd9fb0 to 0xebbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855173c0 INFO: task kworker/0:499:5597 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b3246000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:500:5601 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:500 state:D stack:0 pid:5601 tgid:5601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbd1d84 r8:00000002 r7:60000113 r6:ebbd1d8c r5:8487ec00 r4:8487ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8487ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85517540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8487ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb755000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85640f8c r4:85640c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85640f8c r4:85514100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487ec00 r8:8551412c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85514100 r10:00000000 r9:85514100 r8:80287e08 r7:ebbd5e60 r6:85514300 r5:8487ec00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) r4:82ac21e4 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:501:5602 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:501 state:D stack:0 pid:5602 tgid:5602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbddd84 r8:00000002 r7:60000113 r6:ebbddd8c r5:85600c00 r4:85600c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b369a000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:502:5603 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:502 state:D stack:0 pid:5603 tgid:5603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbc1d84 r8:00000002 r7:60000113 r6:ebbc1d8c r5:84866000 r4:84866000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84866000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85517880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84866000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb785000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564178c r4:85641400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564178c r4:85514400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84866000 r8:8551442c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85514400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85514400 r8:80287e08 r7:ebbdde60 r6:85514480 r5:84866000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc1fb0 to 0xebbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85517580 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:503:5606 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:503 state:D stack:0 pid:5606 tgid:5606 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbe1d84 r8:00000002 r7:60000113 r6:ebbe1d8c r5:84ac0000 r4:84ac0000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac0000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe1e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85641b8c r4:85641800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85514500 r8:80287e08 r7:ebbc1e60 r6:85514600 r5:84ac0000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:82ac21e4 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:5608 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:5608 tgid:5608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbe9d84 r8:00000002 r7:60000113 r6:ebbe9d8c r5:84ac0c00 r4:84ac0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85641f8c r4:85641c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85514680 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:730:5609 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:730 state:D stack:0 pid:5609 tgid:5609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbe5d84 r8:00000002 r7:60000113 r6:ebbe5d8c r5:84ac1800 r4:84ac1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe5e08 r4:00000000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550cc40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ac1800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba75000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856dbb8c r4:856db800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856dbb8c r4:85521980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac1800 r8:855219ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85521980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85521980 r8:80287e08 r7:ebba5e60 r6:85514580 r5:84ac1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe5fb0 to 0xebbe5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:849a8000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:505:5611 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:505 state:D stack:0 pid:5611 tgid:5611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbf1d84 r8:00000002 r7:60000113 r6:ebbf1d8c r5:84ac3000 r4:84ac3000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac3000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85517c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ac3000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564238c r4:85642000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564238c r4:85514700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac3000 r8:8551472c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85514700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85514700 r8:80287e08 r7:ebbe9e60 r6:85514900 r5:84ac3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbf1fb0 to 0xebbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85517c00 INFO: task kworker/0:505:5611 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b4302000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:506:5613 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:506 state:D stack:0 pid:5613 tgid:5613 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbedd84 r8:00000002 r7:60000013 r6:ebbedd8c r5:84ac2400 r4:84ac2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666180 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85642b8c r4:85642800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b4302000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:507:5615 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85511080 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ac5400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb829000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564278c r4:85642400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564278c r4:85514a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac5400 r8:85514a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85514a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85514a00 r8:80287e08 r7:ebbede60 r6:85514880 r5:84ac5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbf9fb0 to 0xebbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:e0029dc0 r5:00001000 r4:dfe13000 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:508:5617 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:5617 tgid:5617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbf5d84 r8:00000002 r7:60000013 r6:ebbf5d8c r5:84ac4800 r4:84ac4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ac4800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb88d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85642f8c r4:85642c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85642f8c r4:85514a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac4800 r8:85514aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85514a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85514a80 r8:80287e08 r7:ebbede60 r6:85514b80 r5:84ac4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbf5fb0 to 0xebbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85666140 INFO: task kworker/0:508:5617 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r5:84aebb8c r4:84aeb800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:509:5619 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:509 state:D stack:0 pid:5619 tgid:5619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc01d84 r8:00000002 r7:60000013 r6:ebc01d8c r5:84ac6c00 r4:84ac6c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc01e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ac6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564338c r4:85643000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564338c r4:85514c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac6c00 r8:85514c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85514c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85514c00 r8:80287e08 r7:ebbf5e60 r6:85514b00 r5:84ac6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc01fb0 to 0xebc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85666300 INFO: task kworker/0:509:5619 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:e0029dc0 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:5621 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:5621 tgid:5621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbfdd84 r8:00000002 r7:60000013 r6:ebbfdd8c r5:84ac6000 r4:84ac6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbfde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ac6000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564378c r4:85643400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564378c r4:85514c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac6000 r8:85514cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85514c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85514c80 r8:80287e08 r7:ebc01e60 r6:85514d80 r5:84ac6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbfdfb0 to 0xebbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85666480 INFO: task kworker/0:510:5621 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:5623 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:511 state:D stack:0 pid:5623 tgid:5623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc09d84 r8:00000002 r7:60000013 r6:ebc09d8c r5:856b0c00 r4:856b0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856b0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc09e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85643b8c r4:85643800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85643b8c r4:85514e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0c00 r8:85514e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85514e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85514e00 r8:80287e08 r7:ebbfde60 r6:85514d00 r5:856b0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc09fb0 to 0xebc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85666740 INFO: task kworker/0:511:5623 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b4c4c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ebc21d84 r8:00000002 r7:60000013 r6:ebc21d8c r5:856b1800 r4:856b1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856b1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc21e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc19000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85643f8c r4:85643c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85643f8c r4:85514f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b1800 r8:85514fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85514f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85514f80 r8:80287e08 r7:ebc09e60 r6:85514e80 r5:856b1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc21fb0 to 0xebc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85666cc0 INFO: task kworker/0:512:5626 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b5483000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:5628 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:5628 tgid:5628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc2dd84 r8:00000002 r7:60000013 r6:ebc2dd8c r5:856b3000 r4:856b3000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565c040 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564c38c r4:8564c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564c38c r4:85514f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b3000 r8:85514f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85514f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85514f00 r8:80287e08 r7:ebc21e60 r6:8543be80 r5:856b3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc2dfb0 to 0xebc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85666b80 INFO: task kworker/0:513:5628 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b56ae000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 r4:00000000 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 Exception stack(0xe0029fb0 to 0xe0029ff8) INFO: task kworker/1:731:5629 blocked for more than 475 seconds. r5:856b3c00 r4:8291a680 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d3640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb10f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e538c r4:856e5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e538c r4:85521b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b3c00 r8:85521bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85521b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85521b80 r8:80287e08 r7:ebba5e60 r6:8550ee00 r5:856b3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc31fb0 to 0xebc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8550ce40 INFO: task kworker/1:731:5629 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b56ae000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc05e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565c2c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564c78c r4:8564c400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r4:00000001 Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:514:5632 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:514 state:D stack:0 pid:5632 tgid:5632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc11d84 r8:00000002 r7:60000113 r6:ebc11d8c r5:85623000 r4:85623000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85623000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc11e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550cb00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85623000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e438c r4:856e4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856e438c r4:85661000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85623000 r8:8566102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85661000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85661000 r8:80287e08 r7:ebc2de60 r6:85521a00 r5:85623000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc11fb0 to 0xebc11ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r5:800d0113 r4:80239bb0 r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8462f100 r10:8291a684 r9:ebc45d84 r8:00000002 r7:60000113 r6:ebc45d8c r5:85626000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564cb8c r4:8564c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564cb8c r4:85661180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85626000 r8:856611ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85661180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85661180 r8:80287e08 r7:ebc11e60 r6:85521c80 r5:85626000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc45fb0 to 0xebc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8565c300 INFO: task kworker/0:515:5634 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b5f17000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849a8000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8462f100 task:kworker/1:733 state:D stack:0 pid:5637 tgid:5637 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc35e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564ff8c r4:8564fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8564ff8c r4:85521d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85626c00 r8:85521d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85521d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85521d00 r8:80287e08 r7:ebc31e60 r6:85521e80 r5:85626c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc35fb0 to 0xebc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8550c940 INFO: task kworker/1:733:5637 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b6356000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:849a8000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:ebc59d84 r8:00000002 r7:60000013 r6:ebc59d8c r5:85624800 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8565c000 INFO: task kworker/0:516:5639 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b6356000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 9fa0: 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc5de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:dfe13000 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8565c6c0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b6e2f000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8462f100 r5:856b2400 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565c940 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:800d0113 r4:80239bb0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:8564df8c r4:8564dc00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:00001000 r4:dfe13000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564e38c r4:8564e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564e38c r4:85661480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b5400 r8:856614ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85661480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85661480 r8:80287e08 r7:ebc65e60 r6:85661580 r5:856b5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc7dfb0 to 0xebc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8565cac0 INFO: task kworker/0:521:5650 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b72da000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe0029fb0 to 0xe0029ff8) Workqueue: events bpf_prog_free_deferred [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8564e78c r4:8564e400 r4:00000001 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fa0: 00000000 00000000 00000000 00000000 r5:856b0000 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565c3c0 r10:61c88647 r9:856b0000 r8:856616ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:524:5655 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:524 state:D stack:0 pid:5655 tgid:5655 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856b6c00 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663680 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:800d0113 r4:80239bb0 r5:00001000 r4:dfe13000 r4:00000001 Not tainted 6.15.0-rc7-syzkaller #0 r4:00000000 r5:00001000 r4:ebce7000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r5:00001000 r4:dfe13000 r4:00000001 r4:8462f100 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564fb8c r4:8564f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564fb8c r4:85661880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a70000 r8:856618ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85661880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85661880 r8:80287e08 r7:ebcdde60 r6:85661b00 r5:84a70000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebce5fb0 to 0xebce5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567c100 INFO: task kworker/0:526:5658 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:85661980 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:800d0113 r4:80239bb0 r5:00001000 r4:dfe13000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-rc7-syzkaller #0 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567c6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a71800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565438c r4:85654000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565438c r4:85661a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a71800 r8:85661aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85661a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85661a80 r8:80287e08 r7:ebce5e60 r6:85661d00 r5:84a71800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcf1fb0 to 0xebcf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567c3c0 INFO: task kworker/0:528:5663 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0029dc0 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84a72400 r4:8291a680 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:849a8000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84a73000 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567c800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8567c900 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: b8df0000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r4:8462f100 r10:8291a684 r9:ebd2dd84 r8:00000002 r7:60000013 r6:ebd2dd8c r5:84a74800 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85687000 r8:80287e08 r7:ebd25e60 r6:85687080 r5:84a74800 r4:00000000 r4:82ac21e4 r5:00001000 r4:dfe13000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:532 state:D stack:0 pid:5673 tgid:5673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba1dd84 r8:00000002 r7:60000013 r6:eba1dd8c r5:84a75400 r4:84a75400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a75400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba1de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567cb40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e890b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85654f8c r4:85654c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85654f8c r4:85687180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a75400 r8:856871ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85687180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85687180 r8:80287e08 r7:ebd2de60 r6:85687100 r5:84a75400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8567cb00 Exception stack(0xe0029d28 to 0xe0029d70) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) Exception stack(0xe0029fb0 to 0xe0029ff8) [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:84aebb8c r4:84aeb800 9fa0: 00000000 00000000 00000000 00000000 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:534:5677 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:534 state:D stack:0 pid:5677 tgid:5677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd31d84 r8:00000002 r7:60000113 r6:ebd31d8c r5:84a76c00 r4:84a76c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a76c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd31e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567cdc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a76c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f000 r4:85687400 r4:8567c580 9d20: ba1b9000 ed729000 00000001 80239b98 7f565000 00000001 r5:84aebb8c r4:84aeb800 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:536:5681 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:536 state:D stack:0 pid:5681 tgid:5681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd39d84 r8:00000002 r7:60000113 r6:ebd39d8c r5:85740c00 r4:85740c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85740c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd39e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85740c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565638c r4:85656000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565638c r4:85687480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85740c00 r8:856874ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85687480 r4:00000001 Workqueue: events bpf_prog_free_deferred [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 INFO: task kworker/0:537:5683 blocked for more than 475 seconds. [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8568f080 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ba9c9000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:dfe13000 Exception stack(0xe0029fb0 to 0xe0029ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565738c r4:85657000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565738c r4:85687880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85743c00 r8:856878ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85687880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85687880 r8:80287e08 r7:ebd3de60 r6:85687a00 r5:85743c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd49fb0 to 0xebd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568f640 INFO: task kworker/0:540:5689 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 800d0113 ffffffff [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f940 r7:dddced80 r6:83018000 r5:8565778c r4:85687a80 r4:8568f740 Exception stack(0xe0029d28 to 0xe0029d70) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) 9fa0: 00000000 00000000 00000000 00000000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8568f900 INFO: task kworker/0:542:5693 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bb3d2000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:849a8000 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:543 state:D stack:0 pid:5695 tgid:5695 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85657b8c r4:85657800 r10:61c88647 r9:85746000 r8:85687bac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bb53f000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:544:5697 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd59e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85746c00 r8:85687c2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:545:5699 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ebd5dd84 r8:00000002 r7:60000113 r6:ebd5dd8c r5:84a68000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c3140 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xebd5dfb0 to 0xebd5dff8) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800d0113 r4:80239bb0 r4:e0029dc0 r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:546:5700 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:546 state:D stack:0 pid:5700 tgid:5700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd51d84 r8:00000002 r7:60000113 r6:ebd51d8c r5:84a68c00 r4:84a68c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a68c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd51e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c3040 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8578078c r4:85780400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xebd51fb0 to 0xebd51ff8) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800d0113 r4:80239bb0 r4:e0029dc0 r5:00001000 r4:dfe13000 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd61e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c32c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a69800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85780f8c r4:85780c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85780f8c r4:857c5080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a69800 r8:857c50ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c5080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5080 r8:80287e08 r7:ebd5de60 r6:857c5180 r5:84a69800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd61fb0 to 0xebd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c3100 INFO: task kworker/0:547:5703 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bbe38000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8578138c r4:85781000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578138c r4:857c5000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a6a400 r8:857c502c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c5000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5000 r8:80287e08 r7:ebd61e60 r6:857c5280 r5:84a6a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd69fb0 to 0xebd69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c3280 INFO: task kworker/0:548:5705 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bc128000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 r5:00001000 r4:dfe13000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:549 state:D stack:0 pid:5707 tgid:5707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd6dd84 r8:00000002 r7:60000113 r6:ebd6dd8c r5:84a6b000 r4:84a6b000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a6b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd6de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c35c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a6b000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8578178c r4:85781400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578178c r4:857c5100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a6b000 r8:857c512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c5100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5100 r8:80287e08 r7:ebd69e60 r6:857c5380 r5:84a6b000 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: bc2ec000 ed729000 00000001 80239b98 7f565000 00000001 r4:e0029dc0 r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:550:5710 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:550 state:D stack:0 pid:5710 tgid:5710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd71d84 r8:00000002 r7:60000113 r6:ebd71d8c r5:84a6bc00 r4:84a6bc00 r5:84a6bc00 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c3700 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:800d0113 r4:80239bb0 r5:00001000 r4:dfe13000 r4:00000001 Not tainted 6.15.0-rc7-syzkaller #0 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:552:5714 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:552 state:D stack:0 pid:5714 tgid:5714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd75d84 r8:00000002 r7:60000113 r6:ebd75d8c r5:84a6d400 r4:84a6d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a6d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd75e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c3a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a6d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8578238c r4:85782000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8578238c r4:857c5500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a6d400 r8:857c552c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c5500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5500 r8:80287e08 r7:ebd65e60 r6:857c5600 r5:84a6d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd75fb0 to 0xebd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c3880 INFO: task kworker/0:552:5714 is blocked on a mutex likely owned by task kworker/0:86:3596. Workqueue: events bpf_prog_free_deferred r5:800d0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:849a8000 9fa0: 00000000 00000000 00000000 00000000 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c3bc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xec585fb0 to 0xec585ff8) Call trace: 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85782b8c r4:85782800 r4:00000001 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:555:5718 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:5718 tgid:5718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd79d84 r8:00000002 r7:60000113 r6:ebd79d8c r5:85758000 r4:85758000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85758000 r8:857c57ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c5780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5780 r8:80287e08 r7:ec589e60 r6:857c5800 r5:85758000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd79fb0 to 0xebd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:800d0113 r4:80239bb0 r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 Exception stack(0xe0029fb0 to 0xe0029ff8) Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc61e08 r5:856e578c r4:856e5400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) INFO: task kworker/1:735:5723 is blocked on a mutex likely owned by task kworker/0:86:3596. r4:82ac21e4 r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 Exception stack(0xe0029fb0 to 0xe0029ff8) Workqueue: events bpf_prog_free_deferred [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:856e5b8c r4:856e5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e5b8c r4:857dc180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570bc00 r8:857dc1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc180 r8:80287e08 r7:ebc61e60 r6:857dc000 r5:8570bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc71fb0 to 0xebc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857d3800 INFO: task kworker/1:736:5725 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bd7ca000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85759800 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d3c40 r5:856e5f8c r4:856e5c00 r4:00000001 INFO: task kworker/1:737:5728 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bdb6e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8575a400 r4:8291a680 r9:83018205 r8:8575a400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 r5:00001000 r4:eb77b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e678c r4:856e6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e678c r4:857dc280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8575a400 r8:857dc2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc280 r8:80287e08 r7:ec58de60 r6:857c5b00 r5:8575a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec595fb0 to 0xec595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857d3ac0 INFO: task kworker/1:738:5730 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r5:800d0113 r4:80239bb0 r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0029fb0 to 0xe0029ff8) INFO: task kworker/1:739:5732 blocked for more than 476 seconds. r4:8575b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec599e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8575b000 r8:857dc32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc300 r8:80287e08 r7:ec595e60 r6:857c5a00 r5:8575b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec599fb0 to 0xec599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857d3e40 INFO: task kworker/1:739:5732 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bdc5a000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0029fb0 to 0xe0029ff8) r4:8462f100 task:kworker/1:740 state:D stack:0 pid:5733 tgid:5733 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5a5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df140 r9:83018205 r8:8575bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e6f8c r4:856e6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e6f8c r4:857dc380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8575bc00 r8:857dc3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc380 r8:80287e08 r7:ec595e60 r6:857c5a80 r5:8575bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5a5fb0 to 0xec5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857d3e80 INFO: task kworker/1:740:5733 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: be6f1000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:741:5735 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:741 state:D stack:0 pid:5735 tgid:5735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5a9d84 r8:00000002 r7:60000113 r6:ec5a9d8c r5:8575c800 r4:8575c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8575c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5a9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8575c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb799000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e6b8c r4:856e6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e6b8c r4:857dc400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8575c800 r8:857dc42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc400 r8:80287e08 r7:ec5a5e60 r6:857c5b80 r5:8575c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5a9fb0 to 0xec5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857d3d40 INFO: task kworker/1:741:5735 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: be6f1000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:742:5738 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:742 state:D stack:0 pid:5738 tgid:5738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec591d84 r8:00000002 r7:60000113 r6:ec591d8c r5:8570b000 r4:8570b000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec591e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8570b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb807000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e738c r4:856e7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e738c r4:857dc200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570b000 r8:857dc22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc200 r8:80287e08 r7:ec5a5e60 r6:857dc480 r5:8570b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec591fb0 to 0xec591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857df380 INFO: task kworker/1:742:5738 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bf095000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:743:5740 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:743 state:D stack:0 pid:5740 tgid:5740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5b1d84 r8:00000002 r7:60000013 r6:ec5b1d8c r5:85708000 r4:85708000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85708000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85708000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e7f8c r4:856e7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e7f8c r4:857dc500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85708000 r8:857dc52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc500 r8:80287e08 r7:ec591e60 r6:857dc580 r5:85708000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b1fb0 to 0xec5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857df1c0 INFO: task kworker/1:743:5740 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bf095000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:744:5741 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:744 state:D stack:0 pid:5741 tgid:5741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5add84 r8:00000002 r7:60000113 r6:ec5add8c r5:8570d400 r4:8570d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5ade08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8570d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb87b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e778c r4:856e7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e778c r4:857dc600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570d400 r8:857dc62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc600 r8:80287e08 r7:ec5b1e60 r6:857dc680 r5:8570d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5adfb0 to 0xec5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857df1c0 INFO: task kworker/1:744:5741 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bf4ad000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:556:5742 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:556 state:D stack:0 pid:5742 tgid:5742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5b9d84 r8:00000002 r7:60000113 r6:ec5b9d8c r5:8570e000 r4:8570e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b0e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8570e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85782f8c r4:85782c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85782f8c r4:857c5c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570e000 r8:857c5c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c5c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5c00 r8:80287e08 r7:ebd79e60 r6:857dc700 r5:8570e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b9fb0 to 0xec5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857d1080 INFO: task kworker/0:556:5742 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bf4ad000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:745:5744 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:745 state:D stack:0 pid:5744 tgid:5744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5bdd84 r8:00000002 r7:60000013 r6:ec5bdd8c r5:8570c800 r4:8570c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5bde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8570c800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e7b8c r4:856e7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e7b8c r4:857dc780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570c800 r8:857dc7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc780 r8:80287e08 r7:ec5b1e60 r6:857c5c80 r5:8570c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5bdfb0 to 0xec5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857df540 INFO: task kworker/1:745:5744 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bf4ad000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:746:5747 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:746 state:D stack:0 pid:5747 tgid:5747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5c9d84 r8:00000002 r7:60000113 r6:ec5c9d8c r5:8575ec00 r4:8575ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8575ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df8c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8575ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb9b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8427e78c r4:8427e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8427e78c r4:857dc900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8575ec00 r8:857dc92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc900 r8:80287e08 r7:ec5b1e60 r6:857c5d00 r5:8575ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5c9fb0 to 0xec5c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857df800 INFO: task kworker/1:746:5747 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c0211000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84ad0000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ec78c r4:856ec400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ec78c r4:857dc880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad0000 r8:857dc8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc880 r8:80287e08 r7:ec5c9e60 r6:857c5d80 r5:84ad0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5d1fb0 to 0xec5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857dfa40 INFO: task kworker/1:747:5749 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) r4:e0029dc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ad0c00 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:749:5752 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:749 state:D stack:0 pid:5752 tgid:5752 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:ec5ddd84 r8:00000002 r7:60000113 r6:ec5ddd8c r5:84ad2400 r9:83018205 r8:84ad2400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0029d28 to 0xe0029d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:750:5753 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:750 state:D stack:0 pid:5753 tgid:5753 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84ad3000 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:856ecb8c r4:856ec800 r10:61c88647 r9:84ad3000 r8:857dc9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0029dc0 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 9fa0: 00000000 00000000 00000000 00000000 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:856edf8c r4:856edc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856edf8c r4:857dcb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad5400 r8:857dcbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcb80 r8:80287e08 r7:ec5e1e60 r6:857c5f80 r5:84ad5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5edfb0 to 0xec5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857dfec0 INFO: task kworker/1:751:5757 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c0e0a000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:752:5758 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:752 state:D stack:0 pid:5758 tgid:5758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5f1d84 r8:00000002 r7:60000013 r6:ec5f1d8c r5:84ad3c00 r4:84ad3c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad3c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d3f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc39000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ecf8c r4:856ecc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ecf8c r4:857dcb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad3c00 r8:857dcb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcb00 r8:80287e08 r7:ec5ede60 r6:85661d80 r5:84ad3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5f1fb0 to 0xec5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857dfec0 INFO: task kworker/1:752:5758 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c0e0a000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:753:5760 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:753 state:D stack:0 pid:5760 tgid:5760 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5f9d84 r8:00000002 r7:60000113 r6:ec5f9d8c r5:84ad4800 r4:84ad4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad4800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc4b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ed38c r4:856ed000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ed38c r4:857dcc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad4800 r8:857dcc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcc00 r8:80287e08 r7:ec5ede60 r6:85661b80 r5:84ad4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5f9fb0 to 0xec5f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857d31c0 INFO: task kworker/1:753:5760 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c118c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:754:5762 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:754 state:D stack:0 pid:5762 tgid:5762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec601d84 r8:00000002 r7:60000113 r6:ec601d8c r5:84ad6000 r4:84ad6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec601e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad6000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ed78c r4:856ed400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ed78c r4:857dcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad6000 r8:857dccac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcc80 r8:80287e08 r7:ec5ede60 r6:857c0000 r5:84ad6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec601fb0 to 0xec601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857d32c0 INFO: task kworker/1:754:5762 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c118c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:755:5764 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:755 state:D stack:0 pid:5764 tgid:5764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec609d84 r8:00000002 r7:60000113 r6:ec609d8c r5:84ad6c00 r4:84ad6c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec609e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc73000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856edb8c r4:856ed800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856edb8c r4:857dcd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad6c00 r8:857dcd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcd00 r8:80287e08 r7:ec5ede60 r6:857c0080 r5:84ad6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec609fb0 to 0xec609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6100 INFO: task kworker/1:755:5764 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c1814000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:756:5766 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:756 state:D stack:0 pid:5766 tgid:5766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec611d84 r8:00000002 r7:60000113 r6:ec611d8c r5:8575d400 r4:8575d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8575d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec611e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c66c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8575d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcdf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856eeb8c r4:856ee800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856eeb8c r4:857dce00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8575d400 r8:857dce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dce00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dce00 r8:80287e08 r7:ec5ede60 r6:857c0100 r5:8575d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec611fb0 to 0xec611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6140 INFO: task kworker/1:756:5766 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c1814000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:757:5769 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:757 state:D stack:0 pid:5769 tgid:5769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec619d84 r8:00000002 r7:60000013 r6:ec619d8c r5:84ad1800 r4:84ad1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec619e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad1800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcbd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ee38c r4:856ee000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ee38c r4:857dce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad1800 r8:857dceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dce80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dce80 r8:80287e08 r7:ec611e60 r6:857c0180 r5:84ad1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec619fb0 to 0xec619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6400 INFO: task kworker/1:757:5769 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c1f0e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:758:5770 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:758 state:D stack:0 pid:5770 tgid:5770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec61dd84 r8:00000002 r7:60000113 r6:ec61dd8c r5:85760000 r4:85760000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85760000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec61de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85760000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebccd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ee78c r4:856ee400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ee78c r4:857dcd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85760000 r8:857dcdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcd80 r8:80287e08 r7:ec611e60 r6:857c0200 r5:85760000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec61dfb0 to 0xec61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6400 INFO: task kworker/1:758:5770 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c1f0e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:759:5772 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:759 state:D stack:0 pid:5772 tgid:5772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec625d84 r8:00000002 r7:60000113 r6:ec625d8c r5:85761800 r4:85761800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85761800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec625e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85761800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856eff8c r4:856efc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856eff8c r4:857dcf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85761800 r8:857dcfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcf80 r8:80287e08 r7:ec611e60 r6:857c0280 r5:85761800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec625fb0 to 0xec625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c64c0 INFO: task kworker/1:759:5772 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c2579000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:760:5774 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:760 state:D stack:0 pid:5774 tgid:5774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec62dd84 r8:00000002 r7:60000013 r6:ec62dd8c r5:85760c00 r4:85760c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85760c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec62de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85760c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebceb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856eef8c r4:856eec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856eef8c r4:8566f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85760c00 r8:8566f42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566f400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566f400 r8:80287e08 r7:ec625e60 r6:857c0300 r5:85760c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec62dfb0 to 0xec62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6600 INFO: task kworker/1:760:5774 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c2dd7000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:761:5776 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:761 state:D stack:0 pid:5776 tgid:5776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec635d84 r8:00000002 r7:60000113 r6:ec635d8c r5:85762400 r4:85762400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85762400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec635e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85762400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd01000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ef38c r4:856ef000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ef38c r4:857ba000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85762400 r8:857ba02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba000 r8:80287e08 r7:ec625e60 r6:857c0380 r5:85762400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec635fb0 to 0xec635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6740 INFO: task kworker/1:761:5776 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c2dd7000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:762:5779 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:762 state:D stack:0 pid:5779 tgid:5779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec641d84 r8:00000002 r7:60000113 r6:ec641d8c r5:85763000 r4:85763000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85763000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec641e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85763000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ef78c r4:856ef400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ef78c r4:857ba180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85763000 r8:857ba1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba180 r8:80287e08 r7:ec625e60 r6:857c0400 r5:85763000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec641fb0 to 0xec641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6880 INFO: task kworker/1:762:5779 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c366e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:763:5780 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:763 state:D stack:0 pid:5780 tgid:5780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec645d84 r8:00000002 r7:60000113 r6:ec645d8c r5:85763c00 r4:85763c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85763c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec645e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85763c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856efb8c r4:856ef800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856efb8c r4:857ba200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85763c00 r8:857ba22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba200 r8:80287e08 r7:ec625e60 r6:857c0480 r5:85763c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec645fb0 to 0xec645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c69c0 INFO: task kworker/1:763:5780 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c366e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:764:5783 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:764 state:D stack:0 pid:5783 tgid:5783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec659d84 r8:00000002 r7:60000013 r6:ec659d8c r5:85766c00 r4:85766c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85766c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec659e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85766c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec64d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f038c r4:856f0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f038c r4:857ba080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85766c00 r8:857ba0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba080 r8:80287e08 r7:ec625e60 r6:857c0500 r5:85766c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec659fb0 to 0xec659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6b00 INFO: task kworker/1:764:5783 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c366e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Exception stack(0xe0029fb0 to 0xe0029ff8) r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:765:5785 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:765 state:D stack:0 pid:5785 tgid:5785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec675d84 r8:00000002 r7:60000113 r6:ec675d8c r5:85766000 r4:85766000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85766000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec675e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85766000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f178c r4:856f1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f178c r4:857ba280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85766000 r8:857ba2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba280 r8:80287e08 r7:ec659e60 r6:857c0580 r5:85766000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec675fb0 to 0xec675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6d80 INFO: task kworker/1:765:5785 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c366e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec685e08 r5:856f078c r4:856f0400 r10:00000000 r9:857ba380 r8:80287e08 r7:ec675e60 r6:857c0600 r5:8575e000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:00000001 Not tainted 6.15.0-rc7-syzkaller #0 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec68de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85768000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec67d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f0b8c r4:856f0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f0b8c r4:857ba400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85768000 r8:857ba42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba400 r8:80287e08 r7:ec675e60 r6:857c0680 r5:85768000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec68dfb0 to 0xec68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857d1140 INFO: task kworker/1:767:5788 is blocked on a mutex likely owned by task kworker/0:86:3596. Call trace: 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:00000000 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85769800 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:857ba300 r8:80287e08 r7:ec675e60 r6:857c0700 r5:85769800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec69dfb0 to 0xec69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85683080 INFO: task kworker/1:768:5790 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c510b000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683180 r5:856f138c r4:856f1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:857ba480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba480 r8:80287e08 r7:ec675e60 r6:857c0780 r5:8576b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6adfb0 to 0xec6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85683240 INFO: task kworker/1:769:5792 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c553b000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:770:5794 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:770 state:D stack:0 pid:5794 tgid:5794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6b9d84 r8:00000002 r7:60000113 r6:ec6b9d8c r5:85768c00 r4:85768c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85768c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b9e08 r5:00001000 r4:e06b1000 r5:856f1f8c r4:856f1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683500 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856f1b8c r4:856f1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f1b8c r4:857ba600 r10:61c88647 r9:8576bc00 r8:857ba62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0029d28 to 0xe0029d70) r5:800d0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:557:5798 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:557 state:D stack:0 pid:5798 tgid:5798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6a5d84 r8:00000002 r7:60000113 r6:ec6a5d8c r5:8576c800 r4:8576c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8576c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847fb640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8576c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb50d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85783b8c r4:85783800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85783b8c r4:857c0900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8576c800 r8:857c092c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c0900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c0900 r8:80287e08 r7:ebd79e60 r6:857c0a80 r5:8576c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6a5fb0 to 0xec6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b0dc0 INFO: task kworker/0:557:5798 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c6399000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Exception stack(0xe0029fb0 to 0xe0029ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:772:5801 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:772 state:D stack:0 pid:5801 tgid:5801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6e1d84 r8:00000002 r7:60000113 r6:ec6e1d8c r5:8576ec00 r4:8576ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8576ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8576ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb001000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f238c r4:856f2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f238c r4:857ba500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8576ec00 r8:857ba52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba500 r8:80287e08 r7:ec6b9e60 r6:857c0980 r5:8576ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e1fb0 to 0xec6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856835c0 INFO: task kworker/1:772:5801 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c6399000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:773:5803 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:773 state:D stack:0 pid:5803 tgid:5803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:8576a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e9e08 r9:83018205 r8:8576a400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:856f2b8c r4:856f2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f2b8c r4:857ba780 r10:61c88647 r9:8576a400 r8:857ba7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800d0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:00000000 r5:00001000 r4:dfe13000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:774:5804 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:774 state:D stack:0 pid:5804 tgid:5804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6edd84 r8:00000002 r7:60000113 r6:ec6edd8c r5:8576e000 r4:8576e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8576e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6ede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8576e000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb219000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f278c r4:856f2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f278c r4:857ba680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8576e000 r8:857ba6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba680 r8:80287e08 r7:ec6e9e60 r6:857c0b00 r5:8576e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6edfb0 to 0xec6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856834c0 INFO: task kworker/1:774:5804 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c6ee3000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:775:5806 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:775 state:D stack:0 pid:5806 tgid:5806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6f5d84 r8:00000002 r7:60000113 r6:ec6f5d8c r5:85764800 r4:85764800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85764800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85764800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb709000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f338c r4:856f3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f338c r4:857ba800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85764800 r8:857ba82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba800 r8:80287e08 r7:ec6e9e60 r6:857c0b80 r5:85764800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6f5fb0 to 0xec6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85683a40 INFO: task kworker/1:775:5806 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0029d28 to 0xe0029d70) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85765400 r5:85765400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6fde08 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856f2f8c r4:856f2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f2f8c r4:857ba880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85765400 r8:857ba8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba880 r8:80287e08 r7:ec6f5e60 r6:857c0c00 r5:85765400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6fdfb0 to 0xec6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85683900 INFO: task kworker/1:776:5808 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c7138000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:777:5811 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:777 state:D stack:0 pid:5811 tgid:5811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec709d84 r8:00000002 r7:60000113 r6:ec709d8c r5:85771800 r4:85771800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85771800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec709e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85771800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f378c r4:856f3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f378c r4:857ba700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85771800 r8:857ba72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba700 r8:80287e08 r7:ec6f5e60 r6:857c0c80 r5:85771800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec709fb0 to 0xec709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85683ac0 INFO: task kworker/1:777:5811 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c7a31000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:778:5813 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:778 state:D stack:0 pid:5813 tgid:5813 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec711d84 r8:00000002 r7:60000013 r6:ec711d8c r5:85772400 r4:85772400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85772400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec711e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85772400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f438c r4:856f4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f438c r4:857ba900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85772400 r8:857ba92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba900 r8:80287e08 r7:ec709e60 r6:857c0d00 r5:85772400 Exception stack(0xec711fb0 to 0xec711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85683d00 INFO: task kworker/1:778:5813 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c7a31000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:779:5814 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:779 state:D stack:0 pid:5814 tgid:5814 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec715d84 r8:00000002 r7:60000113 r6:ec715d8c r5:85770c00 r4:85770c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85770c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec715e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85770c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb939000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856f3b8c r4:856f3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f3b8c r4:857baa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:857baa00 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85683d00 INFO: task kworker/1:779:5814 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c7fc1000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:780:5816 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:780 state:D stack:0 pid:5816 tgid:5816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec71dd84 r8:00000002 r7:60000013 r6:ec71dd8c r5:85770000 r4:85770000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85770000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec71de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b0040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85770000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb961000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f3f8c r4:856f3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f3f8c r4:857baa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85770000 r8:857baaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857baa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857baa80 r8:80287e08 r7:ec711e60 r6:857c0e00 r5:85770000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec71dfb0 to 0xec71dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b0fc0 INFO: task kworker/1:780:5816 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c7fc1000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:781:5818 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:781 state:D stack:0 pid:5818 tgid:5818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec725d84 r8:00000002 r7:60000113 r6:ec725d8c r5:85773000 r4:85773000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85773000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec725e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85773000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f538c r4:856f5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f538c r4:857ba980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85773000 r8:857ba9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba980 r8:80287e08 r7:ec711e60 r6:857c0e80 r5:85773000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec725fb0 to 0xec725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85683400 INFO: task kworker/1:781:5818 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 Exception stack(0xe0029d28 to 0xe0029d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:782:5820 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:782 state:D stack:0 pid:5820 tgid:5820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec72dd84 r8:00000002 r7:60000013 r6:ec72dd8c r5:85775400 r4:85775400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85775400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec72de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d1a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85775400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f478c r4:856f4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f478c r4:857ba100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85775400 r8:857ba12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba100 r8:80287e08 r7:ec725e60 r6:857c0f00 r5:85775400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec72dfb0 to 0xec72dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b0940 INFO: task kworker/1:782:5820 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 Exception stack(0xe0029d28 to 0xe0029d70) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:783:5822 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:783 state:D stack:0 pid:5822 tgid:5822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec735d84 r8:00000002 r7:60000113 r6:ec735d8c r5:85774800 r4:85774800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85774800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec735e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85774800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f4b8c r4:856f4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f4b8c r4:857bab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85774800 r8:857babac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857bab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bab80 r8:80287e08 r7:ec725e60 r6:857c0f80 r5:85774800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec735fb0 to 0xec735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8080 INFO: task kworker/1:783:5822 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:82ac21e4 r4:e0029dc0 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:784:5824 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:784 state:D stack:0 pid:5824 tgid:5824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec73dd84 r8:00000002 r7:60000113 r6:ec73dd8c r5:85773c00 r4:85773c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85773c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec73de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85773c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f4f8c r4:856f4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f4f8c r4:857bac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85773c00 r8:857bac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857bac00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bac00 r8:80287e08 r7:ec725e60 r6:854b5000 r5:85773c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec73dfb0 to 0xec73dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8200 INFO: task kworker/1:784:5824 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c8e44000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:785:5826 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:785 state:D stack:0 pid:5826 tgid:5826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec745d84 r8:00000002 r7:60000113 r6:ec745d8c r5:85776000 r4:85776000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85776000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec745e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85776000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb55000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f578c r4:856f5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f578c r4:857bac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85776000 r8:857bacac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857bac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bac80 r8:80287e08 r7:ec725e60 r6:854b5080 r5:85776000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec745fb0 to 0xec745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8400 INFO: task kworker/1:785:5826 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c8e44000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:786:5828 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:786 state:D stack:0 pid:5828 tgid:5828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec755d84 r8:00000002 r7:60000013 r6:ec755d8c r5:85776c00 r4:85776c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85776c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec755e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85776c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f5f8c r4:856f5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f5f8c r4:857bab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85776c00 r8:857bab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857bab00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bab00 r8:80287e08 r7:ec745e60 r6:854b5100 r5:85776c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec755fb0 to 0xec755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f82c0 INFO: task kworker/1:786:5828 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c92dd000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:787:5832 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:787 state:D stack:0 pid:5832 tgid:5832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5c1d84 r8:00000002 r7:60000013 r6:ec5c1d8c r5:848c0000 r4:848c0000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c0000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb87000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f5b8c r4:856f5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f5b8c r4:857bad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c0000 r8:857bad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857bad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bad00 r8:80287e08 r7:ec755e60 r6:854b5180 r5:848c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5c1fb0 to 0xec5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8380 INFO: task kworker/1:787:5832 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c9524000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:788:5834 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:788 state:D stack:0 pid:5834 tgid:5834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec75dd84 r8:00000002 r7:60000113 r6:ec75dd8c r5:848c0c00 r4:848c0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec75de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec757000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f638c r4:856f6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f638c r4:857bae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c0c00 r8:857bae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857bae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bae00 r8:80287e08 r7:ec755e60 r6:854b5300 r5:848c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec75dfb0 to 0xec75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8680 INFO: task kworker/1:788:5834 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c970c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:789:5836 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:789 state:D stack:0 pid:5836 tgid:5836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec76dd84 r8:00000002 r7:60000013 r6:ec76dd8c r5:848c1800 r4:848c1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec76de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec771000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f6b8c r4:856f6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f6b8c r4:857baf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c1800 r8:857baf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857baf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857baf00 r8:80287e08 r7:ec75de60 r6:854b5200 r5:848c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec76dfb0 to 0xec76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f87c0 INFO: task kworker/1:789:5836 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c970c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:790:5837 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:790 state:D stack:0 pid:5837 tgid:5837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec775d84 r8:00000002 r7:60000013 r6:ec775d8c r5:848c2400 r4:848c2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec775e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f89c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec763000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f678c r4:856f6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f678c r4:857dcf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c2400 r8:857dcf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcf00 r8:80287e08 r7:ec76de60 r6:854b5280 r5:848c2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec775fb0 to 0xec775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8ac0 INFO: task kworker/1:790:5837 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c9f39000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r5:84aebb8c r4:84aeb800 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:791:5839 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:791 state:D stack:0 pid:5839 tgid:5839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6c5d84 r8:00000002 r7:60000013 r6:ec6c5d8c r5:85709800 r4:85709800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85709800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85709800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec77d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f6f8c r4:856f6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f6f8c r4:857bad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85709800 r8:857badac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857bad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bad80 r8:80287e08 r7:ec76de60 r6:857baf80 r5:85709800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6c5fb0 to 0xec6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8a40 INFO: task kworker/1:791:5839 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c9f39000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:792:5842 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:792 state:D stack:0 pid:5842 tgid:5842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:848c3000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ec783000 r5:856f738c r4:856f7000 r7:ddde2d80 r6:83018200 r5:856f738c r4:854f2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c3000 r8:854f202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f2000 r8:80287e08 r7:ec6c5e60 r6:854b5380 r5:848c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec795fb0 to 0xec795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8c80 INFO: task kworker/1:792:5842 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c9f39000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:848c3c00 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8f00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f778c r4:856f7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f778c r4:854f2080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c3c00 r8:854f20ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f2080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f2080 r8:80287e08 r7:ec795e60 r6:854b5400 r5:848c3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7adfb0 to 0xec7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8ac0 INFO: task kworker/1:793:5844 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ca380000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:794:5846 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:794 state:D stack:0 pid:5846 tgid:5846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7bdd84 r8:00000002 r7:60000113 r6:ec7bdd8c r5:848c4800 r4:848c4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7bde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b7100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f7f8c r4:856f7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f7f8c r4:854f2200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c4800 r8:854f222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f2200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f2200 r8:80287e08 r7:ec7ade60 r6:854b5480 r5:848c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7bdfb0 to 0xec7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8e40 INFO: task kworker/1:794:5846 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ca6b8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfe13000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:795:5848 blocked for more than 478 seconds. Call trace: r4:848c5400 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec7bf000 r5:856f7b8c r4:856f7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854f2280 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ca902000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:558:5853 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:558 state:D stack:0 pid:5853 tgid:5853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec749d84 r8:00000002 r7:60000113 r6:ec749d8c r5:848c6000 r4:848c6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec749e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f4680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb85b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a878c r4:857a8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a878c r4:854b5580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c6000 r8:854b55ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5580 r8:80287e08 r7:ebd79e60 r6:854b5700 r5:848c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec749fb0 to 0xec749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0029fb0 to 0xe0029ff8) r4:8462f100 Workqueue: events bpf_prog_free_deferred r4:848c6c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f4140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb75b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8478fb8c r4:8478f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8478fb8c r4:854b5600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c6c00 r8:854b562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5600 r8:80287e08 r7:ec749e60 r6:854b5680 r5:848c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7c9fb0 to 0xec7c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f4240 INFO: task kworker/0:559:5854 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cad28000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Exception stack(0xe0029fb0 to 0xe0029ff8) r4:8462f100 task:kworker/0:560 state:D stack:0 pid:5856 tgid:5856 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec639e08 r4:00000000 r9:83018005 r8:85040000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb78b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8478f78c r4:8478f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8478f78c r4:854b5780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85040000 r8:854b57ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5780 r8:80287e08 r7:ec749e60 r6:854b5900 r5:85040000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec639fb0 to 0xec639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f4440 INFO: task kworker/0:560:5856 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cadb3000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:85040c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594a340 r5:85701f8c r4:85701c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854f2300 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:797:5859 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:797 state:D stack:0 pid:5859 tgid:5859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7d5d84 r8:00000002 r7:60000113 r6:ec7d5d8c r5:8576d400 r4:8576d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8576d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567d880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8576d400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857abf8c r4:857abc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857abf8c r4:854f2380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8576d400 r8:854f23ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f2380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f2380 r8:80287e08 r7:ec7cde60 r6:854f2100 r5:8576d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d5fb0 to 0xec7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b7580 INFO: task kworker/1:797:5859 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cb290000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8570ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7dde08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8570ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a838c r4:857a8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a838c r4:854b5880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570ec00 r8:854b58ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5880 r8:80287e08 r7:ec749e60 r6:854f2180 r5:8570ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7ddfb0 to 0xec7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f4500 INFO: task kworker/0:561:5861 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cb290000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:562 state:D stack:0 pid:5863 tgid:5863 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e5e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857a8f8c r4:857a8c00 r10:61c88647 r9:84a62400 r8:854b5aac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xec7e5fb0 to 0xec7e5ff8) r4:854f45c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cb519000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:5864 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:563 state:D stack:0 pid:5864 tgid:5864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7e9d84 r8:00000002 r7:60000113 r6:ec7e9d8c r5:856c0000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:856c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 r5:857a8b8c r4:857a8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:854b5b00 r8:80287e08 r7:ec7e5e60 r6:854f2480 r5:856c0000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:e0029dc0 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:564 state:D stack:0 pid:5867 tgid:5867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7f5d84 r8:00000002 r7:60000013 r6:ec7f5d8c r5:856c0c00 r4:856c0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f4a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a938c r4:857a9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a938c r4:854b5980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c0c00 r8:854b59ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5980 r8:80287e08 r7:ec7e5e60 r6:854f2500 r5:856c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7f5fb0 to 0xec7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f4840 INFO: task kworker/0:564:5867 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cba8f000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:565:5869 blocked for more than 478 seconds. Call trace: r4:856c3000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857ab38c r4:857ab000 r7:dddced80 r6:83018000 r5:857ab38c r4:854b5b80 r10:61c88647 r9:856c3000 r8:854b5bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:854f4980 INFO: task kworker/0:565:5869 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cba8f000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:566:5870 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:566 state:D stack:0 pid:5870 tgid:5870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec801d84 r8:00000002 r7:60000113 r6:ec801d8c r5:856c1800 r4:856c1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec801e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f4b80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc15000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a978c r4:857a9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a978c r4:854b5c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c1800 r8:854b5cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5c80 r8:80287e08 r7:ec7fde60 r6:854f2600 r5:856c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec801fb0 to 0xec801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f4980 INFO: task kworker/0:566:5870 is blocked on a mutex likely owned by task kworker/0:86:3596. 9d60: 80230ad0 80239bb0 800d0113 ffffffff [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe0029fb0 to 0xe0029ff8) INFO: task kworker/0:567:5872 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:567 state:D stack:0 pid:5872 tgid:5872 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec809d84 r8:00000002 r7:60000113 r6:ec809d8c r5:856c2400 r4:856c2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec809e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f4d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a9b8c r4:857a9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a9b8c r4:854b5d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c2400 r8:854b5d2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xec809fb0 to 0xec809ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f4ac0 INFO: task kworker/0:567:5872 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cbf21000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe0029fb0 to 0xe0029ff8) task:kworker/0:568 state:D stack:0 pid:5874 tgid:5874 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857a9f8c r4:857a9c00 r7:dddced80 r6:83018000 r5:857a9f8c r4:854b5c00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:e0029dc0 r5:84aebb8c r4:84aeb800 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:569:5876 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:569 state:D stack:0 pid:5876 tgid:5876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec819d84 r8:00000002 r7:60000113 r6:ec819d8c r5:856c4800 r4:856c4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec819e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f4f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857aa38c r4:857aa000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857aa38c r4:854b5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c4800 r8:854b5dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5d80 r8:80287e08 r7:ec7fde60 r6:854f2780 r5:856c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec819fb0 to 0xec819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84aebb8c r4:84aeb800 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:570:5878 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:570 state:D stack:0 pid:5878 tgid:5878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec821d84 r8:00000002 r7:60000013 r6:ec821d8c r5:856c5400 r4:856c5400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c5400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec821e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857aa78c r4:857aa400 r10:61c88647 r9:856c5400 r8:854b5eac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec829e08 r5:857aab8c r4:857aa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857aab8c r4:854b5f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c6000 r8:854b5f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5f00 r8:80287e08 r7:ec7fde60 r6:854f2880 r5:856c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec829fb0 to 0xec829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567d280 INFO: task kworker/0:571:5880 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857aaf8c r4:857aac00 r7:dddced80 r6:83018000 r5:857aaf8c r4:8567e000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:ec839d84 r8:00000002 r7:60000013 r6:ec839d8c r5:85711800 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r5:00001000 r4:dfe13000 r4:00000001 r4:8462f100 Call trace: r4:00000000 r9:83018005 r8:85712400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 r4:8567e200 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:5888 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:5888 tgid:5888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec841d84 r8:00000002 r7:60000113 r6:ec841d8c r5:85713000 r4:85713000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85713000 r4:8291a680 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8582878c r4:85828400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582878c r4:8567e100 r4:8567e100 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849a8000 Exception stack(0xe0029fb0 to 0xe0029ff8) INFO: task kworker/0:576:5890 blocked for more than 478 seconds. r5:85713c00 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8582838c r4:8567e280 r10:00000000 r9:8567e280 r8:80287e08 r7:ec841e60 r6:854f2b00 r5:85713c00 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:798:5894 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:798 state:D stack:0 pid:5894 tgid:5894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7d1d84 r8:00000002 r7:60000113 r6:ec7d1d8c r5:85714800 r4:85714800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85714800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b61c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85714800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8570038c r4:85700000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570038c r4:854f2b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85714800 r8:854f2bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f2b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f2b80 r8:80287e08 r7:ec7cde60 r6:854f2d00 r5:85714800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d1fb0 to 0xec7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b6180 INFO: task kworker/1:798:5894 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cd3ae000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:577:5896 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:577 state:D stack:0 pid:5896 tgid:5896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec84dd84 r8:00000002 r7:60000113 r6:ec84dd8c r5:85716000 r4:85716000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85716000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec84de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567dd40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85716000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec605000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85828f8c r4:85828c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85828f8c r4:8567e300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85716000 r8:8567e32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e300 r8:80287e08 r7:ec841e60 r6:854f2c00 r5:85716000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec84dfb0 to 0xec84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567db40 INFO: task kworker/0:577:5896 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cd762000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:578:5897 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:578 state:D stack:0 pid:5897 tgid:5897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec851d84 r8:00000002 r7:60000113 r6:ec851d8c r5:85716c00 r4:85716c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85716c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec851e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567dcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85716c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85828b8c r4:85828800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85828b8c r4:8567e180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85716c00 r8:8567e1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e180 r8:80287e08 r7:ec84de60 r6:854f2c80 r5:85716c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec851fb0 to 0xec851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567db40 INFO: task kworker/0:578:5897 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cda44000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:579:5900 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:579 state:D stack:0 pid:5900 tgid:5900 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec849d84 r8:00000002 r7:60000013 r6:ec849d8c r5:85041800 r4:85041800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85041800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec849e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b5000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85041800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec63b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85829b8c r4:85829800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85829b8c r4:8567e380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85041800 r8:8567e3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e380 r8:80287e08 r7:ec84de60 r6:8567e480 r5:85041800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec849fb0 to 0xec849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567dd80 INFO: task kworker/0:579:5900 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cda44000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:799:5901 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:799 state:D stack:0 pid:5901 tgid:5901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec85dd84 r8:00000002 r7:60000113 r6:ec85dd8c r5:85710000 r4:85710000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85710000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec85de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b6e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85710000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba31000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85700b8c r4:85700800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85700b8c r4:854f2d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85710000 r8:854f2dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f2d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f2d80 r8:80287e08 r7:ec7cde60 r6:854f2e00 r5:85710000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec85dfb0 to 0xec85dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b6500 INFO: task kworker/1:799:5901 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cde85000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:580:5902 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:580 state:D stack:0 pid:5902 tgid:5902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec861d84 r8:00000002 r7:60000113 r6:ec861d8c r5:8570a400 r4:8570a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec861e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b7ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8570a400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec613000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582938c r4:85829000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582938c r4:8567e500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570a400 r8:8567e52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e500 r8:80287e08 r7:ec849e60 r6:854f2e80 r5:8570a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec861fb0 to 0xec861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567dd80 INFO: task kworker/0:580:5902 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cdfb0000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:581:5904 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:581 state:D stack:0 pid:5904 tgid:5904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec869d84 r8:00000002 r7:60000013 r6:ec869d8c r5:85715400 r4:85715400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85715400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec869e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567dd80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85715400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec621000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582978c r4:85829400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582978c r4:8567e400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85715400 r8:8567e42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e400 r8:80287e08 r7:ec849e60 r6:854f2f00 r5:85715400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec869fb0 to 0xec869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b7e80 INFO: task kworker/0:581:5904 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cdfb0000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:582:5906 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:582 state:D stack:0 pid:5906 tgid:5906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7d9d84 r8:00000002 r7:60000113 r6:ec7d9d8c r5:85044800 r4:85044800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85044800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b5500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85044800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582a78c r4:8582a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582a78c r4:8567e680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85044800 r8:8567e6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e680 r8:80287e08 r7:ec849e60 r6:8567e600 r5:85044800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d9fb0 to 0xec7d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b5100 INFO: task kworker/0:582:5906 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ce123000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:583:5908 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:583 state:D stack:0 pid:5908 tgid:5908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec859d84 r8:00000002 r7:60000113 r6:ec859d8c r5:85043000 r4:85043000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85043000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec859e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b5240 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85043000 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85829f8c r4:85829c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85829f8c r4:8567e700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85043000 r8:8567e72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e700 r8:80287e08 r7:ec7d9e60 r6:8567e800 r5:85043000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec859fb0 to 0xec859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b5340 INFO: task kworker/0:583:5908 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ce3e0000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:5910 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:5910 tgid:5910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec865d84 r8:00000002 r7:60000113 r6:ec865d8c r5:85045400 r4:85045400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85045400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec865e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b5380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85045400 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582a38c r4:8582a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582a38c r4:8567e580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85045400 r8:8567e5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e580 r8:80287e08 r7:ec7d9e60 r6:8567e900 r5:85045400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec865fb0 to 0xec865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b5480 INFO: task kworker/0:584:5910 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ce431000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:585:5913 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:585 state:D stack:0 pid:5913 tgid:5913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6e5d84 r8:00000002 r7:60000013 r6:ec6e5d8c r5:85046000 r4:85046000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85046000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b5640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85046000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb39d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582ab8c r4:8582a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582ab8c r4:8567e780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85046000 r8:8567e7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e780 r8:80287e08 r7:ec7d9e60 r6:8567e980 r5:85046000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e5fb0 to 0xec6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b54c0 INFO: task kworker/0:585:5913 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ce5f3000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:5915 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:586 state:D stack:0 pid:5915 tgid:5915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7c5d84 r8:00000002 r7:60000013 r6:ec7c5d8c r5:85046c00 r4:85046c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85046c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b5c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85046c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb991000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582b78c r4:8582b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582b78c r4:8567ea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85046c00 r8:8567ea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567ea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567ea00 r8:80287e08 r7:ec6e5e60 r6:8567eb00 r5:85046c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7c5fb0 to 0xec7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b5580 INFO: task kworker/0:586:5915 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ce729000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:587:5917 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:587 state:D stack:0 pid:5917 tgid:5917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec86dd84 r8:00000002 r7:60000113 r6:ec86dd8c r5:85043c00 r4:85043c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85043c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec86de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b57c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85043c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582af8c r4:8582ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582af8c r4:8567e880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85043c00 r8:8567e8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e880 r8:80287e08 r7:ec7c5e60 r6:8567ea80 r5:85043c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec86dfb0 to 0xec86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b5780 INFO: task kworker/0:587:5917 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ce9ba000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:588:5918 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:588 state:D stack:0 pid:5918 tgid:5918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec701d84 r8:00000002 r7:60000113 r6:ec701d8c r5:85042400 r4:85042400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85042400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec701e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b5a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85042400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582b38c r4:8582b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582b38c r4:8567eb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85042400 r8:8567ebac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567eb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567eb80 r8:80287e08 r7:ec7c5e60 r6:8567ec00 r5:85042400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec701fb0 to 0xec701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b5780 INFO: task kworker/0:588:5918 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ce9ba000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:589:5921 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:589 state:D stack:0 pid:5921 tgid:5921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec879d84 r8:00000002 r7:60000113 r6:ec879d8c r5:85058c00 r4:85058c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85058c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec879e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b5f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85058c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582bb8c r4:8582b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582bb8c r4:8567ed80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85058c00 r8:8567edac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567ed80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567ed80 r8:80287e08 r7:ec7c5e60 r6:8567ee00 r5:85058c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec879fb0 to 0xec879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b5d00 INFO: task kworker/0:589:5921 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ceb43000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ec871d84 r8:00000002 r7:60000113 r6:ec871d8c r5:85718c00 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85700f8c r4:85700c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85718c00 r8:857dc82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:857dc800 r8:80287e08 r7:ec7cde60 r6:85664f80 r5:85718c00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec871fb0 to 0xec871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b6ec0 INFO: task kworker/1:800:5924 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cedea000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:5926 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:5926 tgid:5926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec881d84 r8:00000002 r7:60000113 r6:ec881d8c r5:8571a400 r4:8571a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec881e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85507040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8571a400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582bf8c r4:8582bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582bf8c r4:8567ef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8571a400 r8:8567ef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567ef00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567ef00 r8:80287e08 r7:ec879e60 r6:854f2f80 r5:8571a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec881fb0 to 0xec881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567d840 INFO: task kworker/0:590:5926 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cf12c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:591:5928 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:591 state:D stack:0 pid:5928 tgid:5928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec889d84 r8:00000002 r7:60000113 r6:ec889d8c r5:8571bc00 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:8571bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r5:85830b8c r4:85830800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8567ec80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567d840 INFO: task kworker/0:591:5928 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cf12c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:592:5929 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:592 state:D stack:0 pid:5929 tgid:5929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec88dd84 r8:00000002 r7:60000013 r6:ec88dd8c r5:8571c800 r4:8571c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec88de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8583038c r4:85830000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854b5f80 r4:857c4080 Workqueue: events bpf_prog_free_deferred 9d20: cf216000 ed729000 00000001 80239b98 7f565000 00000001 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:593 state:D stack:0 pid:5931 tgid:5931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec895d84 r8:00000002 r7:60000013 r6:ec895d8c r5:8571b000 r4:8571b000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec895e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c4180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8571b000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583078c r4:85830400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583078c r4:8567ed00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8571b000 r8:8567ed2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567ed00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:82ac21e4 r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:594 state:D stack:0 pid:5934 tgid:5934 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8571d400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a1e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85830f8c r4:85830c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85830f8c r4:854b5a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8571d400 r8:854b5a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5a00 r8:80287e08 r7:ec889e60 r6:857c9100 r5:8571d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a1fb0 to 0xec8a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c4140 INFO: task kworker/0:594:5934 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cf760000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 INFO: task kworker/0:595:5936 blocked for more than 479 seconds. r5:8571e000 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8583178c r4:85831400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8571e000 r8:857c702c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:82ac21e4 r4:00000000 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:596:5937 blocked for more than 479 seconds. Workqueue: events bpf_prog_free_deferred r4:85059800 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85059800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583138c r4:85831000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583138c r4:857c7180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85059800 r8:857c71ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c7180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c7180 r8:80287e08 r7:ec8a9e60 r6:857c7080 r5:85059800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec87dfb0 to 0xec87dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c43c0 INFO: task kworker/0:596:5937 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cfa19000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:597:5939 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:597 state:D stack:0 pid:5939 tgid:5939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8a5d84 r8:00000002 r7:60000013 r6:ec8a5d8c r5:85058000 r5:85058000 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85831f8c r4:85831c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85058000 r8:857c712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:857c4680 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r5:800d0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:598:5941 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:598 state:D stack:0 pid:5941 tgid:5941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8b5d84 r8:00000002 r7:60000113 r6:ec8b5d8c r5:85718000 r4:85718000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85718000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c4880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85718000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec689000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85831b8c r4:85831800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85831b8c r4:857c7200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:857c7200 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800d0113 r4:80239bb0 r4:e0029dc0 r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:85720c00 r4:8291a680 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:85720c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 r5:85832b8c r4:85832800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85832b8c r4:857c7280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85720c00 r8:857c72ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c7280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c7280 r8:80287e08 r7:ec8a5e60 r6:857c9280 r5:85720c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c1fb0 to 0xec8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c4900 INFO: task kworker/0:599:5944 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: d00b9000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:5945 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:5945 tgid:5945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8c5d84 r8:00000002 r7:60000113 r6:ec8c5d8c r5:85721800 r4:85721800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85721800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c4b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85721800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583238c r4:85832000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583238c r4:857c7400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85721800 r8:857c742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c7400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c7400 r8:80287e08 r7:ec8c1e60 r6:857c9300 r5:85721800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c5fb0 to 0xec8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c4900 INFO: task kworker/0:600:5945 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: d0421000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:601:5947 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:601 state:D stack:0 pid:5947 tgid:5947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8cdd84 r8:00000002 r7:60000013 r6:ec8cdd8c r5:85720000 r4:85720000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85720000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8583278c r4:85832400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583278c r4:857c7500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85720000 r8:857c752c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c7500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c7500 r8:80287e08 r7:ec8c1e60 r6:857c9380 r5:85720000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8cdfb0 to 0xec8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c4d00 INFO: task kworker/0:601:5947 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r5:84aebb8c r4:84aeb800 r4:849a8000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred